General
-
Target
a73c5bafb911421ca539cc8817687b3875af65d56ac66da4463d5bd20a685cd0
-
Size
1.0MB
-
Sample
240406-bkxn1agg54
-
MD5
bf6430338110d018a3ef6439b7f87438
-
SHA1
fce4ba3a0733e2d53f27eac3804635d06b0ad77d
-
SHA256
a73c5bafb911421ca539cc8817687b3875af65d56ac66da4463d5bd20a685cd0
-
SHA512
82148643cc2cb48834bc1a40c7e823fe88bd688c8c514b3fc83a596bdb59193ea5e10f8e619eef6d4c221a0a499d5a1807b5f5a13a6bcfa881557f80e3e8ecc4
-
SSDEEP
24576:lUY0XkQjca2bGBWvqnC1IBEt1SMgmj+nFKLu7P:+Y00QHaLvjyEt1jj+nFKLu7
Behavioral task
behavioral1
Sample
a73c5bafb911421ca539cc8817687b3875af65d56ac66da4463d5bd20a685cd0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a73c5bafb911421ca539cc8817687b3875af65d56ac66da4463d5bd20a685cd0.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
a73c5bafb911421ca539cc8817687b3875af65d56ac66da4463d5bd20a685cd0
-
Size
1.0MB
-
MD5
bf6430338110d018a3ef6439b7f87438
-
SHA1
fce4ba3a0733e2d53f27eac3804635d06b0ad77d
-
SHA256
a73c5bafb911421ca539cc8817687b3875af65d56ac66da4463d5bd20a685cd0
-
SHA512
82148643cc2cb48834bc1a40c7e823fe88bd688c8c514b3fc83a596bdb59193ea5e10f8e619eef6d4c221a0a499d5a1807b5f5a13a6bcfa881557f80e3e8ecc4
-
SSDEEP
24576:lUY0XkQjca2bGBWvqnC1IBEt1SMgmj+nFKLu7P:+Y00QHaLvjyEt1jj+nFKLu7
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-