General
-
Target
1.rar
-
Size
4.4MB
-
Sample
240403-qpascsdf7x
-
MD5
b97fac2bfe6de66b4a615780cb6b1cc2
-
SHA1
1ccd56e4113b00ea818f47ca90ba16a80f167dba
-
SHA256
c81d5421b18c59c9d6df2553e5791e2bb37e8b9d34c93004290bae8aa4ed5ec4
-
SHA512
97e163fc66484c9677802650e7affead5c9f537f746eb0d82b1d196e3e13d9ccea76938211235f68cb562b3fd056526f43ad881f4d244ba7767f9b35e238cc60
-
SSDEEP
98304:7Hw2wByKZdIAtG/pupt2kv70X+iPLMPGcebMimKHpGu:LPqpagtx7q+iIPczHAu
Static task
static1
Behavioral task
behavioral1
Sample
1.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1.rar
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
1.rar
-
Size
4.4MB
-
MD5
b97fac2bfe6de66b4a615780cb6b1cc2
-
SHA1
1ccd56e4113b00ea818f47ca90ba16a80f167dba
-
SHA256
c81d5421b18c59c9d6df2553e5791e2bb37e8b9d34c93004290bae8aa4ed5ec4
-
SHA512
97e163fc66484c9677802650e7affead5c9f537f746eb0d82b1d196e3e13d9ccea76938211235f68cb562b3fd056526f43ad881f4d244ba7767f9b35e238cc60
-
SSDEEP
98304:7Hw2wByKZdIAtG/pupt2kv70X+iPLMPGcebMimKHpGu:LPqpagtx7q+iIPczHAu
-
Detect Rokrat payload
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-