General
-
Target
b86a7ce8a5123d96e0b58d11ad9a4b5c
-
Size
99KB
-
Sample
240307-llly1agd52
-
MD5
b86a7ce8a5123d96e0b58d11ad9a4b5c
-
SHA1
a4d54af7edcb90166a45daebda3c7480cbb8f889
-
SHA256
d2e85e7b7780412824dff9101015b99fb701f621ceefa03c1258598b93ce9687
-
SHA512
bc0c0a249266f3486c9670cfc90a60683475f9accfbe0a256b3de00843807d5d1b51e4b9cc8d350baa59877284ea874d8315c7cb3663a6a678372b70d56529c9
-
SSDEEP
3072:N47excGxFLPkH9SnbZDaFwQtzmhkrUyZ31dLiikrXx:N+eGYtPk0Z+FwMzikrlZXW9
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
149KB
-
MD5
bb56c5bb89c3b94f370473b957aece84
-
SHA1
4139ddb92122333d61e57c97cbd75a91bd8a42ed
-
SHA256
b3928bb091873840a406cb0f0c3f5f35fb8c04d729b407672c498f6a78e74f8c
-
SHA512
ff6a55323b554e88d96d3ac29c9e0187f295af7c7065a2bf20b5fe494bdb3068f422142631bc39b24e4174957095e99afffa162065740934f17d94c6cab1a374
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiztfVOO0krXu:AbXE9OiTGfhEClq9pf76
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-