General
-
Target
a535727477d43cd47369ae199cde87b30e4f96d62655f34b19abd0424968848b
-
Size
459KB
-
Sample
240310-ahs3csfc71
-
MD5
07983b0ea82aedfb85dcd6a5e7d13824
-
SHA1
071e0590714986f72452ad31d37a898c28e46e20
-
SHA256
a535727477d43cd47369ae199cde87b30e4f96d62655f34b19abd0424968848b
-
SHA512
5a1a3417edccca30f8fa75ba317cb99248468c3a26daef060a0acacb742974bcd629b6858d93110c6cd7748cb754bfc77be4f91f38592031e601db579de3d1ab
-
SSDEEP
12288:A8EQoSMBdk1lSMHvhOOXX2UvoqywIJ1mgkOhhXidB2lEM:A8QdIlSMHMOX1voqywOxhkB2l3
Behavioral task
behavioral1
Sample
a535727477d43cd47369ae199cde87b30e4f96d62655f34b19abd0424968848b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a535727477d43cd47369ae199cde87b30e4f96d62655f34b19abd0424968848b.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
a535727477d43cd47369ae199cde87b30e4f96d62655f34b19abd0424968848b
-
Size
459KB
-
MD5
07983b0ea82aedfb85dcd6a5e7d13824
-
SHA1
071e0590714986f72452ad31d37a898c28e46e20
-
SHA256
a535727477d43cd47369ae199cde87b30e4f96d62655f34b19abd0424968848b
-
SHA512
5a1a3417edccca30f8fa75ba317cb99248468c3a26daef060a0acacb742974bcd629b6858d93110c6cd7748cb754bfc77be4f91f38592031e601db579de3d1ab
-
SSDEEP
12288:A8EQoSMBdk1lSMHvhOOXX2UvoqywIJ1mgkOhhXidB2lEM:A8QdIlSMHMOX1voqywOxhkB2l3
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-