General
-
Target
b579d3f20b566a0dadb01be496fefbb5.exe
-
Size
1.8MB
-
Sample
240315-j1j2vabf5v
-
MD5
b579d3f20b566a0dadb01be496fefbb5
-
SHA1
5637b34c6966ac6651dc7ef08ba9136ee11e6d02
-
SHA256
3eac7021a3fd361916c68f6cfd399bd40cf194822bac151a204366b920b240fa
-
SHA512
597f8da6804c25377349b47cbd3ac3ee4d39bca77258a8ddfdd431eb629836d992bcdf93ebb0b4cfb3bfb73f76731ecd358e6d343318c77626ec6fba93faa079
-
SSDEEP
49152:P7IsGRFnxXZBZr5jQDq53E/ikpoHAU4B6UixDoNCuHt5:P0sGRF1V5jQD2ApoHAU4BADnM5
Static task
static1
Behavioral task
behavioral1
Sample
b579d3f20b566a0dadb01be496fefbb5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b579d3f20b566a0dadb01be496fefbb5.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
b579d3f20b566a0dadb01be496fefbb5.exe
-
Size
1.8MB
-
MD5
b579d3f20b566a0dadb01be496fefbb5
-
SHA1
5637b34c6966ac6651dc7ef08ba9136ee11e6d02
-
SHA256
3eac7021a3fd361916c68f6cfd399bd40cf194822bac151a204366b920b240fa
-
SHA512
597f8da6804c25377349b47cbd3ac3ee4d39bca77258a8ddfdd431eb629836d992bcdf93ebb0b4cfb3bfb73f76731ecd358e6d343318c77626ec6fba93faa079
-
SSDEEP
49152:P7IsGRFnxXZBZr5jQDq53E/ikpoHAU4B6UixDoNCuHt5:P0sGRF1V5jQD2ApoHAU4BADnM5
Score10/10-
Detect Poverty Stealer Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-