General
-
Target
0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c
-
Size
7.5MB
-
Sample
240328-21vsfsbb5w
-
MD5
237f6419f85fe8e734acc1d55ad74ae3
-
SHA1
449b288c56f080af5cdd15205d589d5f92af2e37
-
SHA256
0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c
-
SHA512
4f6fb06476836838df0f8c06e7654dc3c6bf626ef05de46548bda3bfd7b9fcdf8e906b0a122ced51c4dddcf50fb5286db2b52c1dda681e0e15a3c8f0c2ca4420
-
SSDEEP
196608:91OmFkc6AIzxoe9/9/gFj8VJzhBzU7deu/Vyo+TiNZykc7:3OAx6AIzSed9qj8VJdBU7d1yP
Static task
static1
Behavioral task
behavioral1
Sample
0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c
-
Size
7.5MB
-
MD5
237f6419f85fe8e734acc1d55ad74ae3
-
SHA1
449b288c56f080af5cdd15205d589d5f92af2e37
-
SHA256
0b67372303543ffd6723d0137e591be9889da47dd3bedfbff96b88dcbe3a053c
-
SHA512
4f6fb06476836838df0f8c06e7654dc3c6bf626ef05de46548bda3bfd7b9fcdf8e906b0a122ced51c4dddcf50fb5286db2b52c1dda681e0e15a3c8f0c2ca4420
-
SSDEEP
196608:91OmFkc6AIzxoe9/9/gFj8VJzhBzU7deu/Vyo+TiNZykc7:3OAx6AIzSed9qj8VJdBU7d1yP
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-