General
-
Target
cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13.lnk
-
Size
52.0MB
-
Sample
240223-f95s5ace79
-
MD5
acf4085b2fa977fc1350f0ddc2710502
-
SHA1
7155d89bae9acd67f5d8cdf651b73ee6b54262c3
-
SHA256
cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13
-
SHA512
4aa010f680485f0241cbaff77d3a21509e2f73c4fdfe1940aa63f46949fcb39404e4a2c543c465098806b7059fab234de48fe9996ba1edd9c4a9b7b6ca1dbe70
-
SSDEEP
24576:0Zthnqtka+Dj8bI6c94TuDjoZgRXTTYdy830QtO0oIJjW7sFAc1Mh5D2y8:U9OQj85c91wZgjbaJa7d2y8
Static task
static1
Behavioral task
behavioral1
Sample
cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13.lnk
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13.lnk
-
Size
52.0MB
-
MD5
acf4085b2fa977fc1350f0ddc2710502
-
SHA1
7155d89bae9acd67f5d8cdf651b73ee6b54262c3
-
SHA256
cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13
-
SHA512
4aa010f680485f0241cbaff77d3a21509e2f73c4fdfe1940aa63f46949fcb39404e4a2c543c465098806b7059fab234de48fe9996ba1edd9c4a9b7b6ca1dbe70
-
SSDEEP
24576:0Zthnqtka+Dj8bI6c94TuDjoZgRXTTYdy830QtO0oIJjW7sFAc1Mh5D2y8:U9OQj85c91wZgjbaJa7d2y8
-
Detect Rokrat payload
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-