General
-
Target
5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7
-
Size
6.3MB
-
Sample
240425-c39xqadg55
-
MD5
b94d98a7e13b9d8ee0b203e15cee3b77
-
SHA1
25dc94bee8d11ddb38ae2feacea7d2271094f90e
-
SHA256
5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7
-
SHA512
2d6a1baf9a3ad87e7f65075f7754b24e5d2d23067f4468d63fd79e1c4e39a31f29fe8ac27a9b05cebdf03af4a54769c072ea2d444b51cf2203c7f1f9e3267cbc
-
SSDEEP
98304:91Oup2zjJY231tFaCYTlZE1JLFSNGw6eJm5JeHxFKw7/X26jOnCB9XmtPtX4S8B/:91Ow2zjVpYD8vDwJmaHxbS2Os9qP0eEB
Static task
static1
Behavioral task
behavioral1
Sample
5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7
-
Size
6.3MB
-
MD5
b94d98a7e13b9d8ee0b203e15cee3b77
-
SHA1
25dc94bee8d11ddb38ae2feacea7d2271094f90e
-
SHA256
5d9f3e8dac066fb8ecfb8905d7baa8d41c45d446060330c91803aa20f1f5abb7
-
SHA512
2d6a1baf9a3ad87e7f65075f7754b24e5d2d23067f4468d63fd79e1c4e39a31f29fe8ac27a9b05cebdf03af4a54769c072ea2d444b51cf2203c7f1f9e3267cbc
-
SSDEEP
98304:91Oup2zjJY231tFaCYTlZE1JLFSNGw6eJm5JeHxFKw7/X26jOnCB9XmtPtX4S8B/:91Ow2zjVpYD8vDwJmaHxbS2Os9qP0eEB
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-