General
-
Target
5ec68a7770e6de78234031b752b697daaf7e22cc7b88b167228b4c2e1e03826f
-
Size
1.7MB
-
Sample
240404-z4cpyaae7y
-
MD5
45f2f0acf23eef48e87cc30c0828c685
-
SHA1
0a6adaa2cb4726edff158944d2c7d7c3945fc16c
-
SHA256
5ec68a7770e6de78234031b752b697daaf7e22cc7b88b167228b4c2e1e03826f
-
SHA512
834175d868c6228bd5873b794231e8905d35e5130a75f7b5ca236ba23f875faefa83e63ae25191c3818d4ebdd02ff133eec2921722e767314b1fba7f9cae7fa4
-
SSDEEP
49152:+iP4iZpzOYE8TNXZUerwYWgXUxpqSeiiMGS1lbE26NvkiD:+4/ZpzLFcGwvgExpqSeizvlb8
Behavioral task
behavioral1
Sample
5ec68a7770e6de78234031b752b697daaf7e22cc7b88b167228b4c2e1e03826f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ec68a7770e6de78234031b752b697daaf7e22cc7b88b167228b4c2e1e03826f.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
5ec68a7770e6de78234031b752b697daaf7e22cc7b88b167228b4c2e1e03826f
-
Size
1.7MB
-
MD5
45f2f0acf23eef48e87cc30c0828c685
-
SHA1
0a6adaa2cb4726edff158944d2c7d7c3945fc16c
-
SHA256
5ec68a7770e6de78234031b752b697daaf7e22cc7b88b167228b4c2e1e03826f
-
SHA512
834175d868c6228bd5873b794231e8905d35e5130a75f7b5ca236ba23f875faefa83e63ae25191c3818d4ebdd02ff133eec2921722e767314b1fba7f9cae7fa4
-
SSDEEP
49152:+iP4iZpzOYE8TNXZUerwYWgXUxpqSeiiMGS1lbE26NvkiD:+4/ZpzLFcGwvgExpqSeizvlb8
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-