General
-
Target
13549602debc6b5e17f785cd577c287d46d86a94ae4922dcd82e4ddf6d433142
-
Size
7.3MB
-
Sample
240508-2e9z9add57
-
MD5
60a99dce8f2c732b4c852ca4deb1e192
-
SHA1
5ae09d9073966df6c27caa3d91fae62c16106847
-
SHA256
13549602debc6b5e17f785cd577c287d46d86a94ae4922dcd82e4ddf6d433142
-
SHA512
ffa2f386f2754b41725c68efbdc3c0a5f27b73a095aec4686c1ef7e3a677cd949689583c91b5c69cd424c108dab8de00a803b168ad1cb1fd19b5feb9fbf47482
-
SSDEEP
196608:91O4CZWRDzo5RVGwZYUqzunFxpg3r71yQI/pNn5:3O4CZWRDziawZYFzghWrsRpr
Static task
static1
Behavioral task
behavioral1
Sample
13549602debc6b5e17f785cd577c287d46d86a94ae4922dcd82e4ddf6d433142.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
13549602debc6b5e17f785cd577c287d46d86a94ae4922dcd82e4ddf6d433142
-
Size
7.3MB
-
MD5
60a99dce8f2c732b4c852ca4deb1e192
-
SHA1
5ae09d9073966df6c27caa3d91fae62c16106847
-
SHA256
13549602debc6b5e17f785cd577c287d46d86a94ae4922dcd82e4ddf6d433142
-
SHA512
ffa2f386f2754b41725c68efbdc3c0a5f27b73a095aec4686c1ef7e3a677cd949689583c91b5c69cd424c108dab8de00a803b168ad1cb1fd19b5feb9fbf47482
-
SSDEEP
196608:91O4CZWRDzo5RVGwZYUqzunFxpg3r71yQI/pNn5:3O4CZWRDziawZYFzghWrsRpr
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-