General
-
Target
Test.exe
-
Size
9.2MB
-
Sample
240425-v3jdwadb49
-
MD5
b01154c983274709022b794cf81f08e0
-
SHA1
5303aa929121973e4aad145137733081adbe863e
-
SHA256
0f96ad76723af755fc1a21af4f9b953920419105108508364b5387001381b962
-
SHA512
c2070c0d032d93fa8ec440c4a87ab9d35cd28becd9f259bb84ecc05d3711d278dbc11433fa4fca4a50928b6cbe884acc20f8a817287aeedd18f57fbdbbb96ebb
-
SSDEEP
196608:whEtL1ZUDdDwGcsAgectcGfcY3gtywIf7E5MsWSESkYeu1ODU:tHUDdk3meWcGfdlYM0KuGU
Malware Config
Targets
-
-
Target
Test.exe
-
Size
9.2MB
-
MD5
b01154c983274709022b794cf81f08e0
-
SHA1
5303aa929121973e4aad145137733081adbe863e
-
SHA256
0f96ad76723af755fc1a21af4f9b953920419105108508364b5387001381b962
-
SHA512
c2070c0d032d93fa8ec440c4a87ab9d35cd28becd9f259bb84ecc05d3711d278dbc11433fa4fca4a50928b6cbe884acc20f8a817287aeedd18f57fbdbbb96ebb
-
SSDEEP
196608:whEtL1ZUDdDwGcsAgectcGfcY3gtywIf7E5MsWSESkYeu1ODU:tHUDdk3meWcGfdlYM0KuGU
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-