General
-
Target
4d242a0dfa7657a6844fd63477dc9d2a60d44deebceb14fb6d03a3a2bea04eac
-
Size
293KB
-
Sample
240428-zvdkwahd9y
-
MD5
6e702aa2906fd2794a236213be105658
-
SHA1
abf56f7b181e892f2e4464c3dada9271c8a76e26
-
SHA256
4d242a0dfa7657a6844fd63477dc9d2a60d44deebceb14fb6d03a3a2bea04eac
-
SHA512
a29e496fb5a7a1153006b82be8e0427aebb78b63d88a2f8ec95e0737f0694582523a74819c5c9c5c22a9007d5242a92c5c82e67d7748403e97ed150ed9fd2b3d
-
SSDEEP
6144:VjluQoSiIo5RLZX2HHIECXKpjmLo3tj02tgA5/DF6Ne9CYU5BgioMF:VEQoSm/ZmHo8mLKBuAVDY/jbgdMF
Behavioral task
behavioral1
Sample
4d242a0dfa7657a6844fd63477dc9d2a60d44deebceb14fb6d03a3a2bea04eac.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4d242a0dfa7657a6844fd63477dc9d2a60d44deebceb14fb6d03a3a2bea04eac.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
4d242a0dfa7657a6844fd63477dc9d2a60d44deebceb14fb6d03a3a2bea04eac
-
Size
293KB
-
MD5
6e702aa2906fd2794a236213be105658
-
SHA1
abf56f7b181e892f2e4464c3dada9271c8a76e26
-
SHA256
4d242a0dfa7657a6844fd63477dc9d2a60d44deebceb14fb6d03a3a2bea04eac
-
SHA512
a29e496fb5a7a1153006b82be8e0427aebb78b63d88a2f8ec95e0737f0694582523a74819c5c9c5c22a9007d5242a92c5c82e67d7748403e97ed150ed9fd2b3d
-
SSDEEP
6144:VjluQoSiIo5RLZX2HHIECXKpjmLo3tj02tgA5/DF6Ne9CYU5BgioMF:VEQoSm/ZmHo8mLKBuAVDY/jbgdMF
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-