General
-
Target
eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e.exe
-
Size
43KB
-
Sample
240221-etyjfabc8x
-
MD5
ed3326070afd94f87cdaf84b73e6e9ef
-
SHA1
672a4894dbfccee529479f48b72a5d9387bf4e80
-
SHA256
eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e
-
SHA512
e50daaa2e312bf1f58aa75009b963570f8bb7839606a05a344cebaa28485789804f3014f7bbbe56f96a89fb148a1dc8a5adb70a1fea5ab7f2bcabd10a6b24948
-
SSDEEP
768:+zQLbMYi+I2XsS35xRGUZjsosoTwoM1LmelYdX/1QXcmYZllsXEFiRNi:+zQEYiZ2cS35xRGUaosoMoM17lY91QMb
Static task
static1
Behavioral task
behavioral1
Sample
eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e.exe
-
Size
43KB
-
MD5
ed3326070afd94f87cdaf84b73e6e9ef
-
SHA1
672a4894dbfccee529479f48b72a5d9387bf4e80
-
SHA256
eb76472cb7a072bbfb59918ef1594ca866fbd9884b2776cb5e427dcec2d3b13e
-
SHA512
e50daaa2e312bf1f58aa75009b963570f8bb7839606a05a344cebaa28485789804f3014f7bbbe56f96a89fb148a1dc8a5adb70a1fea5ab7f2bcabd10a6b24948
-
SSDEEP
768:+zQLbMYi+I2XsS35xRGUZjsosoTwoM1LmelYdX/1QXcmYZllsXEFiRNi:+zQEYiZ2cS35xRGUaosoMoM17lY91QMb
Score10/10-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects executables containing artifacts associated with disabling Widnows Defender
-
Detects executables embedding command execution via IExecuteCommand COM object
-
Detects executables potentially checking for WinJail sandbox window
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-