General
-
Target
cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899
-
Size
1.3MB
-
Sample
240319-lsrg3agf83
-
MD5
58e761d55078c9f8cf14d0d7f14c1856
-
SHA1
3000cbd9a83825e24f66d1da6dd6cc0d53b487cc
-
SHA256
cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899
-
SHA512
576ea33a7b21506a6e5ab95391a6478805d1df6cfbe594187b834984a377bbcd5e46d979c63249674ac2cf897ed23a2d72be64214d6a5c7eee4bebf03820519a
-
SSDEEP
24576:l+aekL6WKjEik+9+5Ybdafw8Q/V/Xddm+fC7xoG:iWKjE605YbdPXNHmT1
Behavioral task
behavioral1
Sample
cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899
-
Size
1.3MB
-
MD5
58e761d55078c9f8cf14d0d7f14c1856
-
SHA1
3000cbd9a83825e24f66d1da6dd6cc0d53b487cc
-
SHA256
cfe67dc0f112ee08ac13cca056e45258105014f10eb5cc7f432ac571b166a899
-
SHA512
576ea33a7b21506a6e5ab95391a6478805d1df6cfbe594187b834984a377bbcd5e46d979c63249674ac2cf897ed23a2d72be64214d6a5c7eee4bebf03820519a
-
SSDEEP
24576:l+aekL6WKjEik+9+5Ybdafw8Q/V/Xddm+fC7xoG:iWKjE605YbdPXNHmT1
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-