General
-
Target
21edab02c1ad7d249b699ee02a1db46ddbec44793d8016b14a21eb9a4c9ae9b9
-
Size
1.9MB
-
Sample
240403-x3wejsac4z
-
MD5
272a3d2b72ac26dbd3cc94886f031bbb
-
SHA1
9b1fb176fbe6d7a51550afc70fce817c65a1b75a
-
SHA256
21edab02c1ad7d249b699ee02a1db46ddbec44793d8016b14a21eb9a4c9ae9b9
-
SHA512
7e2aee9bb3ec7fdf26444ee76f9b5a6facf86846d891efc2bc7ca875eb25bc46abb3b50b5f26b4193b9ec6aefe7e48513447c59c17de3a142cb53eb24dc1c6d2
-
SSDEEP
49152:A34LlNIF+j7Ibyzlybnp06JpoMBmZUzP6bwQL4:44y+jsbSlKp02poMFEwQk
Behavioral task
behavioral1
Sample
21edab02c1ad7d249b699ee02a1db46ddbec44793d8016b14a21eb9a4c9ae9b9.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21edab02c1ad7d249b699ee02a1db46ddbec44793d8016b14a21eb9a4c9ae9b9.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
21edab02c1ad7d249b699ee02a1db46ddbec44793d8016b14a21eb9a4c9ae9b9
-
Size
1.9MB
-
MD5
272a3d2b72ac26dbd3cc94886f031bbb
-
SHA1
9b1fb176fbe6d7a51550afc70fce817c65a1b75a
-
SHA256
21edab02c1ad7d249b699ee02a1db46ddbec44793d8016b14a21eb9a4c9ae9b9
-
SHA512
7e2aee9bb3ec7fdf26444ee76f9b5a6facf86846d891efc2bc7ca875eb25bc46abb3b50b5f26b4193b9ec6aefe7e48513447c59c17de3a142cb53eb24dc1c6d2
-
SSDEEP
49152:A34LlNIF+j7Ibyzlybnp06JpoMBmZUzP6bwQL4:44y+jsbSlKp02poMFEwQk
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-