General
-
Target
c28698fb7793316606141e59d6f32bc7
-
Size
45KB
-
Sample
240312-ftgrcsbb72
-
MD5
c28698fb7793316606141e59d6f32bc7
-
SHA1
5fc1e08a5213ac4ba94bcb64b2e2a1f7dbab4104
-
SHA256
9d414195a8cb7fe4018e16b5b425ccf64d8f50405a298705173c5310bfd0326b
-
SHA512
2ba80cd1072e9e334953c5ef08416ab179bcf86cdf019731e689fd66eae8cb1cace25f5eb2a93c6ee6cb829728e16b5b74228c8c19f0d0fb957f3f7e725ba870
-
SSDEEP
768:LRVZwlephZYNuRrIKM/GsNEpFjEf8o688PUQ0Zbnwzoxz5FhVkdvDyg:LRAephXq/hxf36JUjZhxdFhKdvZ
Static task
static1
Behavioral task
behavioral1
Sample
c28698fb7793316606141e59d6f32bc7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c28698fb7793316606141e59d6f32bc7.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
c28698fb7793316606141e59d6f32bc7
-
Size
45KB
-
MD5
c28698fb7793316606141e59d6f32bc7
-
SHA1
5fc1e08a5213ac4ba94bcb64b2e2a1f7dbab4104
-
SHA256
9d414195a8cb7fe4018e16b5b425ccf64d8f50405a298705173c5310bfd0326b
-
SHA512
2ba80cd1072e9e334953c5ef08416ab179bcf86cdf019731e689fd66eae8cb1cace25f5eb2a93c6ee6cb829728e16b5b74228c8c19f0d0fb957f3f7e725ba870
-
SSDEEP
768:LRVZwlephZYNuRrIKM/GsNEpFjEf8o688PUQ0Zbnwzoxz5FhVkdvDyg:LRAephXq/hxf36JUjZhxdFhKdvZ
Score8/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3