General
-
Target
5d223a430018bab98ee630c482e7c2fcfb585a3374c05a308444377075c6defe
-
Size
1.8MB
-
Sample
240424-t35fnsdc9v
-
MD5
1aaadbac0b9f7031f2b0944a1e504db8
-
SHA1
5c20f4afb3a4b9a10d9982259c61bbac7f7c739f
-
SHA256
5d223a430018bab98ee630c482e7c2fcfb585a3374c05a308444377075c6defe
-
SHA512
ab884269367835a6a72a8d3ba2a3137c388d813cdd63eb4f364598bf8529dbd94de54ae0d1a902e7657c958f9d9019d31c3cac0ce583f9d866a14d5013b001c9
-
SSDEEP
49152:AC0CO/Co0UwqhEjzuiq2bJB095v5dLCJPdH3W:j0bKuoFi95vJ
Behavioral task
behavioral1
Sample
5d223a430018bab98ee630c482e7c2fcfb585a3374c05a308444377075c6defe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d223a430018bab98ee630c482e7c2fcfb585a3374c05a308444377075c6defe.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
5d223a430018bab98ee630c482e7c2fcfb585a3374c05a308444377075c6defe
-
Size
1.8MB
-
MD5
1aaadbac0b9f7031f2b0944a1e504db8
-
SHA1
5c20f4afb3a4b9a10d9982259c61bbac7f7c739f
-
SHA256
5d223a430018bab98ee630c482e7c2fcfb585a3374c05a308444377075c6defe
-
SHA512
ab884269367835a6a72a8d3ba2a3137c388d813cdd63eb4f364598bf8529dbd94de54ae0d1a902e7657c958f9d9019d31c3cac0ce583f9d866a14d5013b001c9
-
SSDEEP
49152:AC0CO/Co0UwqhEjzuiq2bJB095v5dLCJPdH3W:j0bKuoFi95vJ
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-