General
-
Target
df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f
-
Size
869KB
-
Sample
240423-feecpadc3y
-
MD5
0b4f798bb48613ba29403988d1c61a34
-
SHA1
4aebd421560f5527ac9969bfb059a7d990ad92b5
-
SHA256
df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f
-
SHA512
3303e80aa3fea4676f750a9437da693e6392e1864df25a993aa698aaef6ba13cb3201b4e51b480413b31f4643a0b5571a7266bb0c4ba1d2900033be1b18f4c4e
-
SSDEEP
24576:A8xlGOpFq/en6olo/r9Mr2ct3/Lir2iMMibs:AalGB98P1/LiiiMlbs
Behavioral task
behavioral1
Sample
df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f
-
Size
869KB
-
MD5
0b4f798bb48613ba29403988d1c61a34
-
SHA1
4aebd421560f5527ac9969bfb059a7d990ad92b5
-
SHA256
df7c28d10a10ef9a4eab08beb3b1d4028015d608fb1eeecc2f9a395b845a625f
-
SHA512
3303e80aa3fea4676f750a9437da693e6392e1864df25a993aa698aaef6ba13cb3201b4e51b480413b31f4643a0b5571a7266bb0c4ba1d2900033be1b18f4c4e
-
SSDEEP
24576:A8xlGOpFq/en6olo/r9Mr2ct3/Lir2iMMibs:AalGB98P1/LiiiMlbs
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-