General
-
Target
7fb1d891959c341480deb1686a841851043c4f68b3e762a14a60a19a5cf70a10
-
Size
306KB
-
Sample
240407-2pmmpsgg2z
-
MD5
74fbb0917b0510f3f9880ae108d7a8a3
-
SHA1
5d92c74d003ab0a0b10b77b8df1be66d679339fa
-
SHA256
7fb1d891959c341480deb1686a841851043c4f68b3e762a14a60a19a5cf70a10
-
SHA512
9428f1c1f1339b00f06f7cb66200b29cc008b86ac020749d786ac24c8533d3aaf2db0a1e2b38c9ad5c289ebf4e2a57bfd0e2c8763e1f15b94093652861deaafb
-
SSDEEP
6144:CjluQoSIIo5RurElYpCL/qc0Ju/F+Fy581apGhq6/Yh:CEQoSs1LLSVJu/MSeay9G
Behavioral task
behavioral1
Sample
7fb1d891959c341480deb1686a841851043c4f68b3e762a14a60a19a5cf70a10.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7fb1d891959c341480deb1686a841851043c4f68b3e762a14a60a19a5cf70a10.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
7fb1d891959c341480deb1686a841851043c4f68b3e762a14a60a19a5cf70a10
-
Size
306KB
-
MD5
74fbb0917b0510f3f9880ae108d7a8a3
-
SHA1
5d92c74d003ab0a0b10b77b8df1be66d679339fa
-
SHA256
7fb1d891959c341480deb1686a841851043c4f68b3e762a14a60a19a5cf70a10
-
SHA512
9428f1c1f1339b00f06f7cb66200b29cc008b86ac020749d786ac24c8533d3aaf2db0a1e2b38c9ad5c289ebf4e2a57bfd0e2c8763e1f15b94093652861deaafb
-
SSDEEP
6144:CjluQoSIIo5RurElYpCL/qc0Ju/F+Fy581apGhq6/Yh:CEQoSs1LLSVJu/MSeay9G
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-