General
-
Target
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba
-
Size
1.7MB
-
Sample
240424-wx7d7aeg86
-
MD5
05d1c90ec78b45292ea6cbc0e0d2a5ec
-
SHA1
e5ad67b0a0265b6f02b3869131f6bc2ef17eb279
-
SHA256
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba
-
SHA512
d0a3f7d6d69e12f43d2adf0244750e728f20d546ecff92fc674b5f6ddc468f4353e2b77c91459b739556a034e0cfaa3d7c4024170d0c3108076a88d2c377038f
-
SSDEEP
24576:VZyU70mm2QoyUaQQwi2Apubm/fEAD08cYcFpz7gT/To83oGuUNZ1JzSAmFOGYXF:OQ0LQqwxbo8CcYcFpUTb3oGuaJzRPGY
Behavioral task
behavioral1
Sample
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba
-
Size
1.7MB
-
MD5
05d1c90ec78b45292ea6cbc0e0d2a5ec
-
SHA1
e5ad67b0a0265b6f02b3869131f6bc2ef17eb279
-
SHA256
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba
-
SHA512
d0a3f7d6d69e12f43d2adf0244750e728f20d546ecff92fc674b5f6ddc468f4353e2b77c91459b739556a034e0cfaa3d7c4024170d0c3108076a88d2c377038f
-
SSDEEP
24576:VZyU70mm2QoyUaQQwi2Apubm/fEAD08cYcFpz7gT/To83oGuUNZ1JzSAmFOGYXF:OQ0LQqwxbo8CcYcFpUTb3oGuaJzRPGY
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-