General
-
Target
df65b9b8d9edfa61ca70e67b44ae9a0a
-
Size
123KB
-
Sample
240326-rw8hmsfc91
-
MD5
df65b9b8d9edfa61ca70e67b44ae9a0a
-
SHA1
6c546efaefd5d7127bd3f3c4f9668cf7613705f8
-
SHA256
8f6fd90359eee516228f1527b317fe86b9b9f37e0fcfdb6092fad4a6333bc4cb
-
SHA512
4160a87960a06b90584bacd7fd4c2adb2c24e79084654aada81d15798b476071796f6dd9409fec87be5f6fd68e7422c7b414ff82c011ebb4adb195606306e812
-
SSDEEP
3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLOoo:OVYrJrOSsRwcp2
Behavioral task
behavioral1
Sample
df65b9b8d9edfa61ca70e67b44ae9a0a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df65b9b8d9edfa61ca70e67b44ae9a0a.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
df65b9b8d9edfa61ca70e67b44ae9a0a
-
Size
123KB
-
MD5
df65b9b8d9edfa61ca70e67b44ae9a0a
-
SHA1
6c546efaefd5d7127bd3f3c4f9668cf7613705f8
-
SHA256
8f6fd90359eee516228f1527b317fe86b9b9f37e0fcfdb6092fad4a6333bc4cb
-
SHA512
4160a87960a06b90584bacd7fd4c2adb2c24e79084654aada81d15798b476071796f6dd9409fec87be5f6fd68e7422c7b414ff82c011ebb4adb195606306e812
-
SSDEEP
3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLOoo:OVYrJrOSsRwcp2
Score8/10-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-