General
-
Target
29d039f1582855309902d2a3081b59ed313089d07c759ddf67e2ccd9221bb19d
-
Size
389KB
-
Sample
240407-ycmv6ach67
-
MD5
35792de13356a17d0ef59bbbad458d51
-
SHA1
a59a7a30124843345dbaef86410d71484ed125be
-
SHA256
29d039f1582855309902d2a3081b59ed313089d07c759ddf67e2ccd9221bb19d
-
SHA512
2252d3423e7b3567b66aa10124d54f302eea36bf246d075e048aa385bac2e98da5ebad2fb6125196408ad1266c5ff26e5f95b2366ee0f9e1c339aaca456d2705
-
SSDEEP
12288:YEQoSpqhW97nvMS0jF71QieYANyxBIk/e:Yiwr0jF7WkAgP/e
Behavioral task
behavioral1
Sample
29d039f1582855309902d2a3081b59ed313089d07c759ddf67e2ccd9221bb19d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29d039f1582855309902d2a3081b59ed313089d07c759ddf67e2ccd9221bb19d.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
29d039f1582855309902d2a3081b59ed313089d07c759ddf67e2ccd9221bb19d
-
Size
389KB
-
MD5
35792de13356a17d0ef59bbbad458d51
-
SHA1
a59a7a30124843345dbaef86410d71484ed125be
-
SHA256
29d039f1582855309902d2a3081b59ed313089d07c759ddf67e2ccd9221bb19d
-
SHA512
2252d3423e7b3567b66aa10124d54f302eea36bf246d075e048aa385bac2e98da5ebad2fb6125196408ad1266c5ff26e5f95b2366ee0f9e1c339aaca456d2705
-
SSDEEP
12288:YEQoSpqhW97nvMS0jF71QieYANyxBIk/e:Yiwr0jF7WkAgP/e
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-