General
-
Target
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827
-
Size
1.9MB
-
Sample
240403-xqbvdahg91
-
MD5
343b82727f88c565ddccac5af663cc75
-
SHA1
e6c76a20b7f76d71e9e1783e73fc662355eebb58
-
SHA256
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827
-
SHA512
4fc88637dd7a86cf9af23b4153bb9e63b5adda94e780e957e6cc818fa14bac76d29534a9ca35bfecf97f61dedf971bfdebdcfbece3713a9329623fd743d0494d
-
SSDEEP
49152:QJS/J8v3KO4f5knRzRoIIC+X0stNUBTILh0k4+umR/:QJSSv3KOy5YRnzi0stNUBULa0u+/
Behavioral task
behavioral1
Sample
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827
-
Size
1.9MB
-
MD5
343b82727f88c565ddccac5af663cc75
-
SHA1
e6c76a20b7f76d71e9e1783e73fc662355eebb58
-
SHA256
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827
-
SHA512
4fc88637dd7a86cf9af23b4153bb9e63b5adda94e780e957e6cc818fa14bac76d29534a9ca35bfecf97f61dedf971bfdebdcfbece3713a9329623fd743d0494d
-
SSDEEP
49152:QJS/J8v3KO4f5knRzRoIIC+X0stNUBTILh0k4+umR/:QJSSv3KOy5YRnzi0stNUBULa0u+/
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-