General
-
Target
60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8
-
Size
950KB
-
Sample
240421-1814rscb52
-
MD5
1830b3f5f10b2d5b29f2f00b3e203849
-
SHA1
c7fbb0c1951385d285ed36921d3ed3915cf21c13
-
SHA256
60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8
-
SHA512
a49e6493e8762d0524e783a92282a8ea36c37dff5bb1150e03a02f300ee2805e235a03cf5adc482e8b49c66b16df63da9db36e16a9ef85fc5468ec2485af2684
-
SSDEEP
24576:xnBHFqohoB0Az5zZKKDKq5NzMKimpTVVB/VPhg:FjutNlKmZz3h/VPS
Behavioral task
behavioral1
Sample
60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8
-
Size
950KB
-
MD5
1830b3f5f10b2d5b29f2f00b3e203849
-
SHA1
c7fbb0c1951385d285ed36921d3ed3915cf21c13
-
SHA256
60dcb840ee4962101a12799a945ac01cccad6fd18905cf7f7334d329c3b557b8
-
SHA512
a49e6493e8762d0524e783a92282a8ea36c37dff5bb1150e03a02f300ee2805e235a03cf5adc482e8b49c66b16df63da9db36e16a9ef85fc5468ec2485af2684
-
SSDEEP
24576:xnBHFqohoB0Az5zZKKDKq5NzMKimpTVVB/VPhg:FjutNlKmZz3h/VPS
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-