General
-
Target
4fd2766df1483133292d8f0cc79fcec390af105998d741d36cbb837b7c770fca
-
Size
241KB
-
Sample
240407-zths7sed3t
-
MD5
604003fa0b27000e68b4df1de33c9484
-
SHA1
4756149ff0cecafb65a71d0024ea6ab815a940fa
-
SHA256
4fd2766df1483133292d8f0cc79fcec390af105998d741d36cbb837b7c770fca
-
SHA512
e4bcdcb305ddda4e4d2842b60d493f5fb75720f8e015cf2b91e51cf51216c0debcb8be0331c359eda5280c898c77136b55ddd2183434ce61b5d4167f67e0ef4e
-
SSDEEP
6144:0jluQoSxUUa6xml7edU4k9qxLSJKX+s5D:0EQoSJ/xmlidU4kDKXN5D
Behavioral task
behavioral1
Sample
4fd2766df1483133292d8f0cc79fcec390af105998d741d36cbb837b7c770fca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4fd2766df1483133292d8f0cc79fcec390af105998d741d36cbb837b7c770fca.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
4fd2766df1483133292d8f0cc79fcec390af105998d741d36cbb837b7c770fca
-
Size
241KB
-
MD5
604003fa0b27000e68b4df1de33c9484
-
SHA1
4756149ff0cecafb65a71d0024ea6ab815a940fa
-
SHA256
4fd2766df1483133292d8f0cc79fcec390af105998d741d36cbb837b7c770fca
-
SHA512
e4bcdcb305ddda4e4d2842b60d493f5fb75720f8e015cf2b91e51cf51216c0debcb8be0331c359eda5280c898c77136b55ddd2183434ce61b5d4167f67e0ef4e
-
SSDEEP
6144:0jluQoSxUUa6xml7edU4k9qxLSJKX+s5D:0EQoSJ/xmlidU4kDKXN5D
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-