General
-
Target
2e46e7307c971439115f6b451201477ac673e38db7757134888505d8713eff7d
-
Size
6.5MB
-
Sample
240403-n6l6lsch2y
-
MD5
5ac036db54785817a366510d11fe27ff
-
SHA1
3ad032c1efe0bb3510af47af05fc6fe799f8ef2b
-
SHA256
2e46e7307c971439115f6b451201477ac673e38db7757134888505d8713eff7d
-
SHA512
eaa57362ddde75766a2f53dd4492722acdf4f5a2ff11db5ad88d0b2fe38ca7a51bc698d6cda283141ff86c5fa149b2ac6cd07adcadcb455773b41f006b7dbcd0
-
SSDEEP
98304:91OopDcPHB7oWB0q32sghrEGog5UFI0eDyNGfJ9cnqzdmHQuuWy4rk0yaYWngUxV:91OoSKWBz3lgi+0fYLfsvry4A0y2gQHL
Static task
static1
Behavioral task
behavioral1
Sample
2e46e7307c971439115f6b451201477ac673e38db7757134888505d8713eff7d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
2e46e7307c971439115f6b451201477ac673e38db7757134888505d8713eff7d.exe
Resource
win11-20240221-en
Malware Config
Targets
-
-
Target
2e46e7307c971439115f6b451201477ac673e38db7757134888505d8713eff7d
-
Size
6.5MB
-
MD5
5ac036db54785817a366510d11fe27ff
-
SHA1
3ad032c1efe0bb3510af47af05fc6fe799f8ef2b
-
SHA256
2e46e7307c971439115f6b451201477ac673e38db7757134888505d8713eff7d
-
SHA512
eaa57362ddde75766a2f53dd4492722acdf4f5a2ff11db5ad88d0b2fe38ca7a51bc698d6cda283141ff86c5fa149b2ac6cd07adcadcb455773b41f006b7dbcd0
-
SSDEEP
98304:91OopDcPHB7oWB0q32sghrEGog5UFI0eDyNGfJ9cnqzdmHQuuWy4rk0yaYWngUxV:91OoSKWBz3lgi+0fYLfsvry4A0y2gQHL
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-