General
-
Target
7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6
-
Size
1.1MB
-
Sample
240408-2seq9she5x
-
MD5
0f156e93f667dbcc3116c0b29a4352b5
-
SHA1
754f10c9730afc06f76f194dbb00e57d24fa6253
-
SHA256
7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6
-
SHA512
7c2c70324b28803784b4b6d1b254e4829a931dc0a9e135ed0790d6ac1186dbda84cc9a03c7b38c8c8b7d6483116776d119b6215985f8790596326c1bfe00d3c6
-
SSDEEP
24576:lUCMnLg6usY24H69mI6T429j8/OJcDkxPGBHYjfu7cfHJnq:+CKCPH684CAswkxPxjfuMJnq
Behavioral task
behavioral1
Sample
7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6
-
Size
1.1MB
-
MD5
0f156e93f667dbcc3116c0b29a4352b5
-
SHA1
754f10c9730afc06f76f194dbb00e57d24fa6253
-
SHA256
7bcb3961d89acb66ba6d87a8c67b952773c435f414ce870b608986893c1be7b6
-
SHA512
7c2c70324b28803784b4b6d1b254e4829a931dc0a9e135ed0790d6ac1186dbda84cc9a03c7b38c8c8b7d6483116776d119b6215985f8790596326c1bfe00d3c6
-
SSDEEP
24576:lUCMnLg6usY24H69mI6T429j8/OJcDkxPGBHYjfu7cfHJnq:+CKCPH684CAswkxPxjfuMJnq
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-