General
-
Target
4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130
-
Size
114KB
-
Sample
240515-1pqhxsea78
-
MD5
9997673d0012bfe55bc2082b33bce79c
-
SHA1
f55da708a244d9cee79efafa34d49464e95da720
-
SHA256
4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130
-
SHA512
94ad170294f59a50a343b04245a52fc992150a1a49704b5e7b676ed7a91a714f7f231358fa334b2907ab305bf6fb1da97ee6a1bb06224a781cd3cd9c3fbbad5c
-
SSDEEP
768:3x/5inm+cd5rHemPXKqUEphjVuvios1rPr4adL0NqlJMU6wiK1rEKlcIQ1TTGfoX:3xRsvcdCQjosnvnZ6grfQ1b4U
Behavioral task
behavioral1
Sample
4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Targets
-
-
Target
4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130
-
Size
114KB
-
MD5
9997673d0012bfe55bc2082b33bce79c
-
SHA1
f55da708a244d9cee79efafa34d49464e95da720
-
SHA256
4d217145a9247c25721e389971d7d339d9a3057d8c1b06071c706c058a748130
-
SHA512
94ad170294f59a50a343b04245a52fc992150a1a49704b5e7b676ed7a91a714f7f231358fa334b2907ab305bf6fb1da97ee6a1bb06224a781cd3cd9c3fbbad5c
-
SSDEEP
768:3x/5inm+cd5rHemPXKqUEphjVuvios1rPr4adL0NqlJMU6wiK1rEKlcIQ1TTGfoX:3xRsvcdCQjosnvnZ6grfQ1b4U
Score10/10-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-