General
-
Target
1a8b2667ecef2f5c8a171705ad1573a2b4db7581ed181331f152c925491eba09
-
Size
372KB
-
Sample
240403-xr79zahh61
-
MD5
350c6c97a34f7893e06c9f48b673488c
-
SHA1
3b0a97b004070bc78b877b6fd0400660599fb429
-
SHA256
1a8b2667ecef2f5c8a171705ad1573a2b4db7581ed181331f152c925491eba09
-
SHA512
7222f00528ec07c9c16825f500b4ec3fe5562ed11d98400666ff4455db6ad8fecddb650ae1ee476ee5f69fe6aea7a0a99a6a1a4803de6cc909884eff6cb93f76
-
SSDEEP
6144:JjluyDM3Io5R4nM/40yJNkzj7pX2ZKjC2mzvXfbdyrE+NxRTv8lDWyIqiNlB4Rke:JEyDMhqhibpDC2mjXfZ+N3wpiNlCknI
Behavioral task
behavioral1
Sample
1a8b2667ecef2f5c8a171705ad1573a2b4db7581ed181331f152c925491eba09.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a8b2667ecef2f5c8a171705ad1573a2b4db7581ed181331f152c925491eba09.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
1a8b2667ecef2f5c8a171705ad1573a2b4db7581ed181331f152c925491eba09
-
Size
372KB
-
MD5
350c6c97a34f7893e06c9f48b673488c
-
SHA1
3b0a97b004070bc78b877b6fd0400660599fb429
-
SHA256
1a8b2667ecef2f5c8a171705ad1573a2b4db7581ed181331f152c925491eba09
-
SHA512
7222f00528ec07c9c16825f500b4ec3fe5562ed11d98400666ff4455db6ad8fecddb650ae1ee476ee5f69fe6aea7a0a99a6a1a4803de6cc909884eff6cb93f76
-
SSDEEP
6144:JjluyDM3Io5R4nM/40yJNkzj7pX2ZKjC2mzvXfbdyrE+NxRTv8lDWyIqiNlB4Rke:JEyDMhqhibpDC2mjXfZ+N3wpiNlCknI
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-