General
-
Target
470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41
-
Size
1.4MB
-
Sample
240420-1jfrjaag23
-
MD5
c77f6eb8013267b6f532a2763a1be23d
-
SHA1
f68201ff6b157d57dc0c9295b3185c18478f0ea5
-
SHA256
470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41
-
SHA512
c840d594e730ff12ab6def56bd43d4627248d877b3405fadc37a1a376af976789a9da0aae33ad1ef75c54022ef0f8ed6977a44576712ba40a838fe0b18c209ad
-
SSDEEP
24576:YiiJzjtQYCusD6rAHC1Mhf1cCC+GZJ5zuU5qSKcPbsu9jVT9rvGO3:xiJzjtQYC1eMC1IGJZ/yUUSKw7Trp
Behavioral task
behavioral1
Sample
470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41
-
Size
1.4MB
-
MD5
c77f6eb8013267b6f532a2763a1be23d
-
SHA1
f68201ff6b157d57dc0c9295b3185c18478f0ea5
-
SHA256
470cab08c02d6eb5cea56f31c5f0e1c12cc4ad8a607abe16431bbbbebc67da41
-
SHA512
c840d594e730ff12ab6def56bd43d4627248d877b3405fadc37a1a376af976789a9da0aae33ad1ef75c54022ef0f8ed6977a44576712ba40a838fe0b18c209ad
-
SSDEEP
24576:YiiJzjtQYCusD6rAHC1Mhf1cCC+GZJ5zuU5qSKcPbsu9jVT9rvGO3:xiJzjtQYC1eMC1IGJZ/yUUSKw7Trp
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-