General
-
Target
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269
-
Size
97KB
-
Sample
240430-dnj87aag69
-
MD5
a9d9113024886f82aadfa4988765ffa4
-
SHA1
65fe2a95c69931ed4e0c500e9d8372792860e1cd
-
SHA256
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269
-
SHA512
3e79082e57cc87db7448fc6b59d2c301fb301cc42c89438c8fe6fce843d6905d0449a2ed74cb832c3da64dd64be292ed209faacc043c5c95f2a6cd887e081491
-
SSDEEP
1536:dVRVCaKgzbLc54hukfgvYnouy8jV1Ayj4m/QWR/RFN4g2BXGW+:dfjbLl/gvQouth1Tj4mYWR/REg2BX8
Behavioral task
behavioral1
Sample
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269
-
Size
97KB
-
MD5
a9d9113024886f82aadfa4988765ffa4
-
SHA1
65fe2a95c69931ed4e0c500e9d8372792860e1cd
-
SHA256
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269
-
SHA512
3e79082e57cc87db7448fc6b59d2c301fb301cc42c89438c8fe6fce843d6905d0449a2ed74cb832c3da64dd64be292ed209faacc043c5c95f2a6cd887e081491
-
SSDEEP
1536:dVRVCaKgzbLc54hukfgvYnouy8jV1Ayj4m/QWR/RFN4g2BXGW+:dfjbLl/gvQouth1Tj4mYWR/REg2BX8
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-