General
-
Target
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46
-
Size
1.9MB
-
Sample
240416-dcketahe6w
-
MD5
50bf48b00b3f2e40b197f9f935056573
-
SHA1
2330808a446738fc89eeae87d2b2470d7bc49d88
-
SHA256
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46
-
SHA512
bfd8a19101fd3dfb3c83057e826be404c2ce9a2c170b08c864d5d4ff6ace2f7d91a3d372afd746c9deb7b4a935f86f54a3bf17fc2f7ec18baea99480ad97f925
-
SSDEEP
49152:pfe4sTDBq+J0eiGu/a2RhxUCXxveBZt5iKF+E8clIGR:pG4sxJtiS2fiJgKp8clIGR
Behavioral task
behavioral1
Sample
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46
-
Size
1.9MB
-
MD5
50bf48b00b3f2e40b197f9f935056573
-
SHA1
2330808a446738fc89eeae87d2b2470d7bc49d88
-
SHA256
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46
-
SHA512
bfd8a19101fd3dfb3c83057e826be404c2ce9a2c170b08c864d5d4ff6ace2f7d91a3d372afd746c9deb7b4a935f86f54a3bf17fc2f7ec18baea99480ad97f925
-
SSDEEP
49152:pfe4sTDBq+J0eiGu/a2RhxUCXxveBZt5iKF+E8clIGR:pG4sxJtiS2fiJgKp8clIGR
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-