General
-
Target
5103c77d87b036647faa0fb674dedab0f07ec48bd8fa9e2264a7c56e6296c2d7
-
Size
396KB
-
Sample
240407-zvczcaeg33
-
MD5
0921286de85bd59e9f3285122027b14f
-
SHA1
e0c43b12b9000ab393b9c368d51e6e57eda07444
-
SHA256
5103c77d87b036647faa0fb674dedab0f07ec48bd8fa9e2264a7c56e6296c2d7
-
SHA512
202c25a6560661e159c95bcc8f75b486c7ad5fd13eecc5338e05e06e5504c54c3f2d5744b6735b9564be67266b7cb5587d704fefd364376dc4fdbfc09786f80e
-
SSDEEP
12288:7EQoSaqhTHzItN4fGbNyikSQXYjJoPXTAW91Ad4cN:7rLCzKJI4dAj
Behavioral task
behavioral1
Sample
5103c77d87b036647faa0fb674dedab0f07ec48bd8fa9e2264a7c56e6296c2d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5103c77d87b036647faa0fb674dedab0f07ec48bd8fa9e2264a7c56e6296c2d7.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
5103c77d87b036647faa0fb674dedab0f07ec48bd8fa9e2264a7c56e6296c2d7
-
Size
396KB
-
MD5
0921286de85bd59e9f3285122027b14f
-
SHA1
e0c43b12b9000ab393b9c368d51e6e57eda07444
-
SHA256
5103c77d87b036647faa0fb674dedab0f07ec48bd8fa9e2264a7c56e6296c2d7
-
SHA512
202c25a6560661e159c95bcc8f75b486c7ad5fd13eecc5338e05e06e5504c54c3f2d5744b6735b9564be67266b7cb5587d704fefd364376dc4fdbfc09786f80e
-
SSDEEP
12288:7EQoSaqhTHzItN4fGbNyikSQXYjJoPXTAW91Ad4cN:7rLCzKJI4dAj
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-