General
-
Target
7ed380f42d6e78376690d033c70ab68b2dc0f2857b7b62862f30f41220ad3e1e
-
Size
1.9MB
-
Sample
240419-3fkbnaac62
-
MD5
3964ccf617e151b77f7dab781397055b
-
SHA1
bed850c169e901ca607228c78c5862a3b875c0d1
-
SHA256
7ed380f42d6e78376690d033c70ab68b2dc0f2857b7b62862f30f41220ad3e1e
-
SHA512
773ee660edb609a2777f8e08d2987e58cda609f14591916ef71f9c3b5af3c1fd6629ef8daf12f60be0349edd68afd90411c9048dac5ff14186b623b85e3e0397
-
SSDEEP
49152:FgSnkomlo01gQjWywmdw/82aTWVhutAz4g6wUf8thRA:Fco/QjWy1wk2+WVq0HafuRA
Behavioral task
behavioral1
Sample
7ed380f42d6e78376690d033c70ab68b2dc0f2857b7b62862f30f41220ad3e1e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7ed380f42d6e78376690d033c70ab68b2dc0f2857b7b62862f30f41220ad3e1e.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
7ed380f42d6e78376690d033c70ab68b2dc0f2857b7b62862f30f41220ad3e1e
-
Size
1.9MB
-
MD5
3964ccf617e151b77f7dab781397055b
-
SHA1
bed850c169e901ca607228c78c5862a3b875c0d1
-
SHA256
7ed380f42d6e78376690d033c70ab68b2dc0f2857b7b62862f30f41220ad3e1e
-
SHA512
773ee660edb609a2777f8e08d2987e58cda609f14591916ef71f9c3b5af3c1fd6629ef8daf12f60be0349edd68afd90411c9048dac5ff14186b623b85e3e0397
-
SSDEEP
49152:FgSnkomlo01gQjWywmdw/82aTWVhutAz4g6wUf8thRA:Fco/QjWy1wk2+WVq0HafuRA
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-