General
-
Target
5df541c4311a14239efbc4b12cd1631f7e65b9ac825fb0c956536d2776749c7e
-
Size
805KB
-
Sample
240410-18aa2sch64
-
MD5
21f668cd5bf72bd77a66477d6432dc63
-
SHA1
be3c9f5853281ba260e2ae20fb847678cd0e23d8
-
SHA256
5df541c4311a14239efbc4b12cd1631f7e65b9ac825fb0c956536d2776749c7e
-
SHA512
4efba9e574d597e15c51f3d2fcde90519add6ecfbc3bbd680413b72ee7c40210f2f807d4a671a68f81deec145e1b5b637245fdf3324aab6ac04f5726371b1640
-
SSDEEP
12288:VEQoSfqpstwMNEjbyIEijxj4699Pchggr3tBX+072NxPyWNP6b4SoeSQMv7bZabZ:V42g54a9P2r3n5G7PObSQMfMGsd/tZ9
Behavioral task
behavioral1
Sample
5df541c4311a14239efbc4b12cd1631f7e65b9ac825fb0c956536d2776749c7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5df541c4311a14239efbc4b12cd1631f7e65b9ac825fb0c956536d2776749c7e.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
5df541c4311a14239efbc4b12cd1631f7e65b9ac825fb0c956536d2776749c7e
-
Size
805KB
-
MD5
21f668cd5bf72bd77a66477d6432dc63
-
SHA1
be3c9f5853281ba260e2ae20fb847678cd0e23d8
-
SHA256
5df541c4311a14239efbc4b12cd1631f7e65b9ac825fb0c956536d2776749c7e
-
SHA512
4efba9e574d597e15c51f3d2fcde90519add6ecfbc3bbd680413b72ee7c40210f2f807d4a671a68f81deec145e1b5b637245fdf3324aab6ac04f5726371b1640
-
SSDEEP
12288:VEQoSfqpstwMNEjbyIEijxj4699Pchggr3tBX+072NxPyWNP6b4SoeSQMv7bZabZ:V42g54a9P2r3n5G7PObSQMfMGsd/tZ9
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-