General
-
Target
404721f122c9216e8486875ebd15c98dbc406450f59745a438da36d5b2d99154
-
Size
1.6MB
-
Sample
240421-zqwwnabf4t
-
MD5
8e820345b40cad1ddcb492e29b1bb571
-
SHA1
1669cd545f7c3a52415b8aac9495e3ce6b4191ea
-
SHA256
404721f122c9216e8486875ebd15c98dbc406450f59745a438da36d5b2d99154
-
SHA512
0de2fa1bf2a2ae6494872e9ce49be59d5c6cba9bd88c87ae61da0223c5ebd0aa09e6d98ade4bafe72a7bdce0abdd7f24da43ad776be01758fc8f3ed69dc688a7
-
SSDEEP
49152:wCb8TIgScmBotYYQmHQnho9QOKmmcNHE4HujQ:wEaIwEdwmIkWqQ
Behavioral task
behavioral1
Sample
404721f122c9216e8486875ebd15c98dbc406450f59745a438da36d5b2d99154.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
404721f122c9216e8486875ebd15c98dbc406450f59745a438da36d5b2d99154.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
404721f122c9216e8486875ebd15c98dbc406450f59745a438da36d5b2d99154
-
Size
1.6MB
-
MD5
8e820345b40cad1ddcb492e29b1bb571
-
SHA1
1669cd545f7c3a52415b8aac9495e3ce6b4191ea
-
SHA256
404721f122c9216e8486875ebd15c98dbc406450f59745a438da36d5b2d99154
-
SHA512
0de2fa1bf2a2ae6494872e9ce49be59d5c6cba9bd88c87ae61da0223c5ebd0aa09e6d98ade4bafe72a7bdce0abdd7f24da43ad776be01758fc8f3ed69dc688a7
-
SSDEEP
49152:wCb8TIgScmBotYYQmHQnho9QOKmmcNHE4HujQ:wEaIwEdwmIkWqQ
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-