General
-
Target
b694fa258045b8c6d702b0b5d9d48c87
-
Size
99KB
-
Sample
240306-fq4fysbf4y
-
MD5
b694fa258045b8c6d702b0b5d9d48c87
-
SHA1
fb5d40a8793afa866170a87d0fd9dd77c3cc2d0e
-
SHA256
3c66c0bdd204cccd96b6ba7d4b9078bf5265424372ad6f6ceb6796b03161e452
-
SHA512
6f18a8fb9ac3b7ac031712896c724009548e2a7bd34ab58253b065ba1c619390060c612242a244001f08a3f01175139fe414f94fbf7341044c6a90ae4fa7cbc2
-
SSDEEP
3072:D47excGxFLPkH9SnbZDa6mRvNe3L9XPFgoDgTpLnNY:D+eGYtPk0Z+jsL1PFgoDgJna
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
149KB
-
MD5
ccca394b1369e766c53346550b481c57
-
SHA1
47dccd3fc9b7bf7c98f75fa11725089d5a977b4c
-
SHA256
211901e1229d7b816754146ff8d7167e8a92211afe63dc44eb8056d0b054a12a
-
SHA512
98625c9dd7cc8b57609ce20f6f295dc8704a75b49cde806ddbbb040cf3832028425bed0cd0da0c501508fabd2cdc59cd1717fa948362281848ed4ba798990712
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hisUwxgTpLnNq:AbXE9OiTGfhEClq9TwxgJn0
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-