General
-
Target
sysvol.exe
-
Size
1.8MB
-
Sample
240311-rcnn5ace41
-
MD5
03fa96650130466d43c4b486c615294a
-
SHA1
88650e99ae745097810f096035a3272455e0b708
-
SHA256
15bf2e47fd14a3a676452ca26d5c2551a67140ed8e8d3f1ebce9e5fcb7aa3fb4
-
SHA512
c0583e46f845e6a53a559ca4658d7203a921ff9fabb8a5cee20551e80f056d2def72c112921968435a3e30bb0dcd08bb824159f1bca1bcfa137bf3ee3263115f
-
SSDEEP
49152:gwsPtT+HW9zDL6axnzPmZ/lqTpv9Dasv3xzHM3kCJwf:gwMtSAXL68nzgITZBfxxCW
Static task
static1
Behavioral task
behavioral1
Sample
sysvol.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
sysvol.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
sysvol.exe
Resource
win11-20240214-en
Malware Config
Targets
-
-
Target
sysvol.exe
-
Size
1.8MB
-
MD5
03fa96650130466d43c4b486c615294a
-
SHA1
88650e99ae745097810f096035a3272455e0b708
-
SHA256
15bf2e47fd14a3a676452ca26d5c2551a67140ed8e8d3f1ebce9e5fcb7aa3fb4
-
SHA512
c0583e46f845e6a53a559ca4658d7203a921ff9fabb8a5cee20551e80f056d2def72c112921968435a3e30bb0dcd08bb824159f1bca1bcfa137bf3ee3263115f
-
SSDEEP
49152:gwsPtT+HW9zDL6axnzPmZ/lqTpv9Dasv3xzHM3kCJwf:gwMtSAXL68nzgITZBfxxCW
Score10/10-
Detect Poverty Stealer Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-