General
-
Target
7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d
-
Size
1.6MB
-
Sample
240309-24va4aea2y
-
MD5
7c7763e27e7fd9723a4c80be5d924f39
-
SHA1
83c627629f2d692999b23e1b22c6fa08f9584838
-
SHA256
7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d
-
SHA512
da35d68af2224ac1a18b1bc80b12efdad47ee3aa53a09008199a3eaaea241336ee73c332348fc57f85c551322b44ea205f14adb90807b8f139ccd9e5f8b69eef
-
SSDEEP
24576:lq8zHke/6BJLPuYAKe0+Fj5OHcpq1ycwsi/j5za4VAXMfa8sX0F01ckFtVoWY2RQ:LHke/6HPjCr81yrdVA4F0ekvFCZM3A
Static task
static1
Behavioral task
behavioral1
Sample
7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d
-
Size
1.6MB
-
MD5
7c7763e27e7fd9723a4c80be5d924f39
-
SHA1
83c627629f2d692999b23e1b22c6fa08f9584838
-
SHA256
7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d
-
SHA512
da35d68af2224ac1a18b1bc80b12efdad47ee3aa53a09008199a3eaaea241336ee73c332348fc57f85c551322b44ea205f14adb90807b8f139ccd9e5f8b69eef
-
SSDEEP
24576:lq8zHke/6BJLPuYAKe0+Fj5OHcpq1ycwsi/j5za4VAXMfa8sX0F01ckFtVoWY2RQ:LHke/6HPjCr81yrdVA4F0ekvFCZM3A
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-