General
-
Target
c0fabe1fd0cc70e8a717aae77b9a07fe
-
Size
99KB
-
Sample
240311-s8wkaaaf84
-
MD5
c0fabe1fd0cc70e8a717aae77b9a07fe
-
SHA1
b9a2143b76be99db639ba7e48a3f278465ef17ae
-
SHA256
c4b656cbd553a48d6bcf926b8ea6ec3c081774738eb00f924cdc0b3c46ef9533
-
SHA512
c039957f20653e656932d152a89464471f7574b4267a234d093a49ba5b2ccd85855a9f33325db662616084182d830f00cb32d6d3aab23a8dfb4e5d9843638be7
-
SSDEEP
3072:h47excGxFLPkH9SnbZDabWDLZKTOrvn7BW6:h+eGYtPk0Z+8Lhrvn46
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
149KB
-
MD5
ff086d0d59b161c9b6c042e902323622
-
SHA1
a5533ae498366582e9b08cc28821ffd1e00f92a7
-
SHA256
abdc11a0da5cdc6e005a8fa09cf6398ec337cf7801cf5231e50e987345812ea3
-
SHA512
c779d69cad19597bf9a619d6f4599d7df4219d77e6144ee694c5076db56013e34781a691d93e6caac15a861b404bc1c15fdce8e70cb02b90ed7a0cc7015738a6
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hieh/zn7BWR:AbXE9OiTGfhEClq9Mh/zn4R
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-