General
-
Target
app.com
-
Size
1.5MB
-
Sample
240508-wcl8hsfg21
-
MD5
bd3231011448b2d6a335032d11c12cad
-
SHA1
b14bdeccca499668fac5049890bb7f3e5bef9537
-
SHA256
ca066896a28840f4eccb9150adf86170d83337650d28b128cb584e7d8b178695
-
SHA512
4fdf90883f5fde3aeb02b2ddc46c5e3cd421fe98697aca0d31b1aaea39598d2624c3339ab75a96997287c611a7d4dd8459b1c3341fe972cf049885d22c31f3de
-
SSDEEP
24576:U7fGyyeUW7jK9ijzqPoKQ+2L7uUgtAsjxy5U2dTfUpHkKBdsQM+WAM7W:OfFU2m9ijzWoK0zgtAsI5U2dTfAHowQW
Static task
static1
Behavioral task
behavioral1
Sample
app.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
app.com
-
Size
1.5MB
-
MD5
bd3231011448b2d6a335032d11c12cad
-
SHA1
b14bdeccca499668fac5049890bb7f3e5bef9537
-
SHA256
ca066896a28840f4eccb9150adf86170d83337650d28b128cb584e7d8b178695
-
SHA512
4fdf90883f5fde3aeb02b2ddc46c5e3cd421fe98697aca0d31b1aaea39598d2624c3339ab75a96997287c611a7d4dd8459b1c3341fe972cf049885d22c31f3de
-
SSDEEP
24576:U7fGyyeUW7jK9ijzqPoKQ+2L7uUgtAsjxy5U2dTfUpHkKBdsQM+WAM7W:OfFU2m9ijzWoK0zgtAsI5U2dTfAHowQW
-
Detects SSLoad Unpacked payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-