General
-
Target
91a5dcbe155ba98a4921d00b5011ef53a303fde1a4d4033deef897788596074f
-
Size
184KB
-
Sample
240407-3ed39ahf61
-
MD5
dbc767e687183f87b77c8e6c30374117
-
SHA1
bd1402933c18ff4c3e1ad023ff022c6a896c137b
-
SHA256
91a5dcbe155ba98a4921d00b5011ef53a303fde1a4d4033deef897788596074f
-
SHA512
e1f0dd5fef925f6c755d2ee36810601ebe76788e280ebbc3c3308d15f50cc793d7967c62de90382a4a5ec49b40be61fd01463ff980940af58d491d4d535341f2
-
SSDEEP
3072:bjbLl/gvQoutgbqKo4L1Tj4mYWR/R4nkPR/1fplCbcqiDqmgeCGrHgPQ6YFjvBKG:bjluQoSsqaxIo5R4nM/sbx+qmgeCWgPc
Behavioral task
behavioral1
Sample
91a5dcbe155ba98a4921d00b5011ef53a303fde1a4d4033deef897788596074f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91a5dcbe155ba98a4921d00b5011ef53a303fde1a4d4033deef897788596074f.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
91a5dcbe155ba98a4921d00b5011ef53a303fde1a4d4033deef897788596074f
-
Size
184KB
-
MD5
dbc767e687183f87b77c8e6c30374117
-
SHA1
bd1402933c18ff4c3e1ad023ff022c6a896c137b
-
SHA256
91a5dcbe155ba98a4921d00b5011ef53a303fde1a4d4033deef897788596074f
-
SHA512
e1f0dd5fef925f6c755d2ee36810601ebe76788e280ebbc3c3308d15f50cc793d7967c62de90382a4a5ec49b40be61fd01463ff980940af58d491d4d535341f2
-
SSDEEP
3072:bjbLl/gvQoutgbqKo4L1Tj4mYWR/R4nkPR/1fplCbcqiDqmgeCGrHgPQ6YFjvBKG:bjluQoSsqaxIo5R4nM/sbx+qmgeCWgPc
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-