General
-
Target
Install.exe
-
Size
1.4MB
-
Sample
240327-dgnm2aeb9s
-
MD5
23e6eacb8091301933e68db5dc9c3a39
-
SHA1
60801359bc9ad78cd2c91c67d386afc9818893f9
-
SHA256
8f803acf120419a2186bc211caf891ede0b72fdd547a10b2782ad9c5f56e12f2
-
SHA512
394d76ecf73f5c948d80a21420f07ee8182370b53e6b02e7bc31d5ec667cfc6e7245605278bc67cd47cc20e98f4e737335abb4c34c317943f87d5ca831f41187
-
SSDEEP
24576:4YMkvSGYvtruYmp2O6ywuJvWaYE7pZLzbiuVIvpiV/vNo1YjV0Nx:pVu1ruYAQ/gvhYK//g4V3uY4
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win10v2004-20240226-es
Behavioral task
behavioral2
Sample
$TEMP/Players.exe
Resource
win10v2004-20231215-es
Malware Config
Targets
-
-
Target
Install.exe
-
Size
1.4MB
-
MD5
23e6eacb8091301933e68db5dc9c3a39
-
SHA1
60801359bc9ad78cd2c91c67d386afc9818893f9
-
SHA256
8f803acf120419a2186bc211caf891ede0b72fdd547a10b2782ad9c5f56e12f2
-
SHA512
394d76ecf73f5c948d80a21420f07ee8182370b53e6b02e7bc31d5ec667cfc6e7245605278bc67cd47cc20e98f4e737335abb4c34c317943f87d5ca831f41187
-
SSDEEP
24576:4YMkvSGYvtruYmp2O6ywuJvWaYE7pZLzbiuVIvpiV/vNo1YjV0Nx:pVu1ruYAQ/gvhYK//g4V3uY4
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
$TEMP/Players
-
Size
118KB
-
MD5
00797908bfb64d73ae6940e9302bbacd
-
SHA1
c809a3c23bac102caba0d8a7d5ca2ad6d917d437
-
SHA256
0925f0cb0622db66f032a480a13be672cca654758f0a2c5778e4101eb96512e3
-
SHA512
275c5988222de6cd4e0b59eda707efc6af268e9882310a3f14553fd64d400c8e135e7ab8d585c2b46c22fc5107b5ac65cf3fa6b7c9800959db4c6e538b78b657
-
SSDEEP
3072:1Zg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2Uv:1K5vPeDkjGgQaE/loUv
Score1/10 -