General
-
Target
3e2553e6bb9c8ec4aa58f290a7c9362cc3d3cbb98c289e4838cd7aa4644a107c
-
Size
850KB
-
Sample
240415-zcfyaahg6y
-
MD5
3b28178b84b820ff1b57b914b85b40ed
-
SHA1
2491fcc930854ad32e22491c63045bc5d18e3064
-
SHA256
3e2553e6bb9c8ec4aa58f290a7c9362cc3d3cbb98c289e4838cd7aa4644a107c
-
SHA512
abcf42bfda8a5574a202f179a25605abb923d8b84c78d414c31a7bce1fa31253ec6e53c3b675c34f7003e1a26a90f57219137e5bd0e3d24dc57c8f1dc3529f62
-
SSDEEP
12288:YEQoSnqh+nXzkFJ/PHf34B+8ByPmAcq5bW4x2HtQX38pMtj4nZZi30V94Jl:YocXQFJnQU8NUxBxStQcPZMkV9O
Behavioral task
behavioral1
Sample
3e2553e6bb9c8ec4aa58f290a7c9362cc3d3cbb98c289e4838cd7aa4644a107c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e2553e6bb9c8ec4aa58f290a7c9362cc3d3cbb98c289e4838cd7aa4644a107c.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
3e2553e6bb9c8ec4aa58f290a7c9362cc3d3cbb98c289e4838cd7aa4644a107c
-
Size
850KB
-
MD5
3b28178b84b820ff1b57b914b85b40ed
-
SHA1
2491fcc930854ad32e22491c63045bc5d18e3064
-
SHA256
3e2553e6bb9c8ec4aa58f290a7c9362cc3d3cbb98c289e4838cd7aa4644a107c
-
SHA512
abcf42bfda8a5574a202f179a25605abb923d8b84c78d414c31a7bce1fa31253ec6e53c3b675c34f7003e1a26a90f57219137e5bd0e3d24dc57c8f1dc3529f62
-
SSDEEP
12288:YEQoSnqh+nXzkFJ/PHf34B+8ByPmAcq5bW4x2HtQX38pMtj4nZZi30V94Jl:YocXQFJnQU8NUxBxStQcPZMkV9O
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-