General
-
Target
be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07.exe
-
Size
691KB
-
Sample
240522-cq4j6shd2s
-
MD5
0deec6c79c47e3224feaaaa2e70aa8a0
-
SHA1
97d87e3fc3b3f00bcb715e774757d2c0b93e3718
-
SHA256
be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07
-
SHA512
af8a24752b78b8b724ff94c926b35fec965423afe05daed99158dc371e6f79dfeed5666260e9969c5b306b15b08c0f6c6850d998b9661eec205dedf1408db22e
-
SSDEEP
12288:NSlYifTvxAGLIMPqtBnOzZwO9z2rG6yO7VywIDylK728+HU55GUa4sq:3izWeIWAOdBh9g7Ez/FqU7
Static task
static1
Behavioral task
behavioral1
Sample
be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07.exe
-
Size
691KB
-
MD5
0deec6c79c47e3224feaaaa2e70aa8a0
-
SHA1
97d87e3fc3b3f00bcb715e774757d2c0b93e3718
-
SHA256
be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07
-
SHA512
af8a24752b78b8b724ff94c926b35fec965423afe05daed99158dc371e6f79dfeed5666260e9969c5b306b15b08c0f6c6850d998b9661eec205dedf1408db22e
-
SSDEEP
12288:NSlYifTvxAGLIMPqtBnOzZwO9z2rG6yO7VywIDylK728+HU55GUa4sq:3izWeIWAOdBh9g7Ez/FqU7
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-