General
-
Target
d253f8b60ec5e79a0339e2d7c0cd9cd26ad4132f2e39859191623857f48cd30a
-
Size
588KB
-
Sample
240422-d6djcsfa29
-
MD5
3a6d9d2127fa9ea191586e0c7b6af154
-
SHA1
63a3f6b1c6a81e865c74487231099306c0af09a7
-
SHA256
d253f8b60ec5e79a0339e2d7c0cd9cd26ad4132f2e39859191623857f48cd30a
-
SHA512
9b09d42dbc9a62049066cb36d621aaec7c2fdbd03c294b8f4a82458bca81430833bbf6129bc5e820f4c61f065b44507151f502ef4a578d6ef58100b77d3dd3a1
-
SSDEEP
12288:0EQoSC5mPgZfNUEeNN9ZIoutEYQbt8oxPzsx/qhi+/mV0YfWZV1LFy0jd8fIxOZL:0QVNPeEXtEYetVr6qhiimCxZFakiuI
Behavioral task
behavioral1
Sample
d253f8b60ec5e79a0339e2d7c0cd9cd26ad4132f2e39859191623857f48cd30a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d253f8b60ec5e79a0339e2d7c0cd9cd26ad4132f2e39859191623857f48cd30a.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
d253f8b60ec5e79a0339e2d7c0cd9cd26ad4132f2e39859191623857f48cd30a
-
Size
588KB
-
MD5
3a6d9d2127fa9ea191586e0c7b6af154
-
SHA1
63a3f6b1c6a81e865c74487231099306c0af09a7
-
SHA256
d253f8b60ec5e79a0339e2d7c0cd9cd26ad4132f2e39859191623857f48cd30a
-
SHA512
9b09d42dbc9a62049066cb36d621aaec7c2fdbd03c294b8f4a82458bca81430833bbf6129bc5e820f4c61f065b44507151f502ef4a578d6ef58100b77d3dd3a1
-
SSDEEP
12288:0EQoSC5mPgZfNUEeNN9ZIoutEYQbt8oxPzsx/qhi+/mV0YfWZV1LFy0jd8fIxOZL:0QVNPeEXtEYetVr6qhiimCxZFakiuI
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-