General
-
Target
022fd76910470780186b3d64c53875a23e57551590888fb50b02b500f2cc4a2a
-
Size
6.6MB
-
Sample
240407-tf9rwagb8y
-
MD5
e17bea06f20b67d54009cf0093bf0897
-
SHA1
644b0ee7226c9bc16e30ae6dfa54e93bdf0126d2
-
SHA256
022fd76910470780186b3d64c53875a23e57551590888fb50b02b500f2cc4a2a
-
SHA512
a26db94d3a45f05cfd6516f6f621eb4fac19e300fc6a70a971a08bb9bf5830b8a89d4508f4e3551a30f3cf3c19c048a151c3dd5e915d975006e3d03e03e313bf
-
SSDEEP
196608:91Or73gCvR7IDbay+twm5R45TN+Bg8OPcDAjVU0zzL:3Orc4ly+tdUM+8FEjXL
Static task
static1
Behavioral task
behavioral1
Sample
022fd76910470780186b3d64c53875a23e57551590888fb50b02b500f2cc4a2a.exe
Resource
win10v2004-20240319-en
Malware Config
Targets
-
-
Target
022fd76910470780186b3d64c53875a23e57551590888fb50b02b500f2cc4a2a
-
Size
6.6MB
-
MD5
e17bea06f20b67d54009cf0093bf0897
-
SHA1
644b0ee7226c9bc16e30ae6dfa54e93bdf0126d2
-
SHA256
022fd76910470780186b3d64c53875a23e57551590888fb50b02b500f2cc4a2a
-
SHA512
a26db94d3a45f05cfd6516f6f621eb4fac19e300fc6a70a971a08bb9bf5830b8a89d4508f4e3551a30f3cf3c19c048a151c3dd5e915d975006e3d03e03e313bf
-
SSDEEP
196608:91Or73gCvR7IDbay+twm5R45TN+Bg8OPcDAjVU0zzL:3Orc4ly+tdUM+8FEjXL
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-