General
-
Target
dfefe3e557960b387a3b3363fb53711f
-
Size
123KB
-
Sample
240326-ycd81sdd5y
-
MD5
dfefe3e557960b387a3b3363fb53711f
-
SHA1
c1fa41be39ea983718ae723143a1cf1f41bc8f46
-
SHA256
7e7fb4dff1e0523bf224c834dc76897f7f8a5960a724fc24e1a883042c1fd1a2
-
SHA512
480149f7f2bdac380890146681024a93af86735f043f6a14ce71552425d9adaa62ebac76da3c454ee0a205cde643fdf9ba1fa308bfdde2b0940db71a859b5618
-
SSDEEP
3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLL07R38:OVYrJrOSsRwcp498
Behavioral task
behavioral1
Sample
dfefe3e557960b387a3b3363fb53711f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dfefe3e557960b387a3b3363fb53711f.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
dfefe3e557960b387a3b3363fb53711f
-
Size
123KB
-
MD5
dfefe3e557960b387a3b3363fb53711f
-
SHA1
c1fa41be39ea983718ae723143a1cf1f41bc8f46
-
SHA256
7e7fb4dff1e0523bf224c834dc76897f7f8a5960a724fc24e1a883042c1fd1a2
-
SHA512
480149f7f2bdac380890146681024a93af86735f043f6a14ce71552425d9adaa62ebac76da3c454ee0a205cde643fdf9ba1fa308bfdde2b0940db71a859b5618
-
SSDEEP
3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLL07R38:OVYrJrOSsRwcp498
Score8/10-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-