General
-
Target
0333c01901907683103a338358d3820fd17157dcb36829b6390af7d6c7916f9c
-
Size
6.4MB
-
Sample
240408-vh4t3sed76
-
MD5
eaa7abd0e61456ed426bd33356135c8b
-
SHA1
41e441678d068f496329fdc1ab4a5e2549fee65d
-
SHA256
0333c01901907683103a338358d3820fd17157dcb36829b6390af7d6c7916f9c
-
SHA512
bc7ab3f1f66b601178a9883c06f2e98d19162a90073c2cda4b3007bfae3cfaba9f47dd9761a1aa18377e9fa5593e9ff14d0ce8b8b0f44077cf60c3de456165a2
-
SSDEEP
196608:91OY/7zYrLNbdwsL6afXVVuJJREXmb/YRDuAD2h3N:3OYTzkbdwByX61E64jShd
Static task
static1
Behavioral task
behavioral1
Sample
0333c01901907683103a338358d3820fd17157dcb36829b6390af7d6c7916f9c.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
0333c01901907683103a338358d3820fd17157dcb36829b6390af7d6c7916f9c
-
Size
6.4MB
-
MD5
eaa7abd0e61456ed426bd33356135c8b
-
SHA1
41e441678d068f496329fdc1ab4a5e2549fee65d
-
SHA256
0333c01901907683103a338358d3820fd17157dcb36829b6390af7d6c7916f9c
-
SHA512
bc7ab3f1f66b601178a9883c06f2e98d19162a90073c2cda4b3007bfae3cfaba9f47dd9761a1aa18377e9fa5593e9ff14d0ce8b8b0f44077cf60c3de456165a2
-
SSDEEP
196608:91OY/7zYrLNbdwsL6afXVVuJJREXmb/YRDuAD2h3N:3OYTzkbdwByX61E64jShd
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-