General
-
Target
536726fca7351cb560f47d4a2c492f4cb641575caf2bde2abc90cf9a895962b1
-
Size
7.3MB
-
Sample
240504-2efreade4y
-
MD5
7a1ffe789183610a329b46ae80799c00
-
SHA1
a2e1b15ba3b4a6679cfc925b4efa5c309aa0ec25
-
SHA256
536726fca7351cb560f47d4a2c492f4cb641575caf2bde2abc90cf9a895962b1
-
SHA512
55a4390e3a12a629fc82fceb6858a8a3665824c2810a9b8bdb50460f4d342bf8447cc7225aa2ee3838a5311e15a09b3d3cedee54f22d5b71b06dd66bae04109a
-
SSDEEP
196608:91OC03j2c4fUT40PSko/lxOAAl4yAWLQqF8AxFz:3OL3j8ko/e54yAyFjV
Static task
static1
Behavioral task
behavioral1
Sample
536726fca7351cb560f47d4a2c492f4cb641575caf2bde2abc90cf9a895962b1.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
536726fca7351cb560f47d4a2c492f4cb641575caf2bde2abc90cf9a895962b1
-
Size
7.3MB
-
MD5
7a1ffe789183610a329b46ae80799c00
-
SHA1
a2e1b15ba3b4a6679cfc925b4efa5c309aa0ec25
-
SHA256
536726fca7351cb560f47d4a2c492f4cb641575caf2bde2abc90cf9a895962b1
-
SHA512
55a4390e3a12a629fc82fceb6858a8a3665824c2810a9b8bdb50460f4d342bf8447cc7225aa2ee3838a5311e15a09b3d3cedee54f22d5b71b06dd66bae04109a
-
SSDEEP
196608:91OC03j2c4fUT40PSko/lxOAAl4yAWLQqF8AxFz:3OL3j8ko/e54yAyFjV
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-