General
-
Target
8d2a8167e80ff936aa765fd6725bf6e6a56d7183b7222459042f84957e53e2b2
-
Size
576KB
-
Sample
240504-am6t1sbh52
-
MD5
0f7115ace0bf959960d5e1dbdf11ee39
-
SHA1
3b3064ee71f451fe1a6374ac48fe2901ab447c00
-
SHA256
8d2a8167e80ff936aa765fd6725bf6e6a56d7183b7222459042f84957e53e2b2
-
SHA512
156efa684699f1e914691d747c4fcfe8043a731c40387d2a2eb745421af7200b2b5f34dc1d975f61351cc83f568f22c2e395c382e48d8f2b47275471d61929ad
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSp:+NWPkHlUfBgpuPdWzyuDTifgyWlo
Behavioral task
behavioral1
Sample
8d2a8167e80ff936aa765fd6725bf6e6a56d7183b7222459042f84957e53e2b2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d2a8167e80ff936aa765fd6725bf6e6a56d7183b7222459042f84957e53e2b2.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
8d2a8167e80ff936aa765fd6725bf6e6a56d7183b7222459042f84957e53e2b2
-
Size
576KB
-
MD5
0f7115ace0bf959960d5e1dbdf11ee39
-
SHA1
3b3064ee71f451fe1a6374ac48fe2901ab447c00
-
SHA256
8d2a8167e80ff936aa765fd6725bf6e6a56d7183b7222459042f84957e53e2b2
-
SHA512
156efa684699f1e914691d747c4fcfe8043a731c40387d2a2eb745421af7200b2b5f34dc1d975f61351cc83f568f22c2e395c382e48d8f2b47275471d61929ad
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSp:+NWPkHlUfBgpuPdWzyuDTifgyWlo
Score10/10-
UPX dump on OEP (original entry point)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-