General
-
Target
50f2c72e8e901b9c500f1cedaa5d03237d8de584fb6d7361db1dc11279abb2ae
-
Size
1.8MB
-
Sample
240325-xjbwssfg74
-
MD5
f9a94cde16be5d0cf2d7deeef98085fe
-
SHA1
1c010b6d206d3d59fcdc7ed17d5259ffb6ba7dd5
-
SHA256
50f2c72e8e901b9c500f1cedaa5d03237d8de584fb6d7361db1dc11279abb2ae
-
SHA512
ee3f02b0097659caa84db07c530f055d616f0fbbe56f15086014fdcde5728475a01cc129c3dfdaacbd948729f12f1db4d894bd0d22e619791557693ca8e0d30d
-
SSDEEP
49152:RNMqQ0kwonLVkZep9nWrPWwONrRoODiGgDWAg2CPaSAnYvJW3BTSXff6YNQVWIPw:RiqQ0kwonLVkZep9nWrPWwONrRoODiGX
Static task
static1
Behavioral task
behavioral1
Sample
50f2c72e8e901b9c500f1cedaa5d03237d8de584fb6d7361db1dc11279abb2ae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50f2c72e8e901b9c500f1cedaa5d03237d8de584fb6d7361db1dc11279abb2ae.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
50f2c72e8e901b9c500f1cedaa5d03237d8de584fb6d7361db1dc11279abb2ae
-
Size
1.8MB
-
MD5
f9a94cde16be5d0cf2d7deeef98085fe
-
SHA1
1c010b6d206d3d59fcdc7ed17d5259ffb6ba7dd5
-
SHA256
50f2c72e8e901b9c500f1cedaa5d03237d8de584fb6d7361db1dc11279abb2ae
-
SHA512
ee3f02b0097659caa84db07c530f055d616f0fbbe56f15086014fdcde5728475a01cc129c3dfdaacbd948729f12f1db4d894bd0d22e619791557693ca8e0d30d
-
SSDEEP
49152:RNMqQ0kwonLVkZep9nWrPWwONrRoODiGgDWAg2CPaSAnYvJW3BTSXff6YNQVWIPw:RiqQ0kwonLVkZep9nWrPWwONrRoODiGX
Score10/10-
Modifies firewall policy service
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1