General

  • Target

    be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07.exe

  • Size

    691KB

  • Sample

    240522-cq4j6shd2s

  • MD5

    0deec6c79c47e3224feaaaa2e70aa8a0

  • SHA1

    97d87e3fc3b3f00bcb715e774757d2c0b93e3718

  • SHA256

    be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07

  • SHA512

    af8a24752b78b8b724ff94c926b35fec965423afe05daed99158dc371e6f79dfeed5666260e9969c5b306b15b08c0f6c6850d998b9661eec205dedf1408db22e

  • SSDEEP

    12288:NSlYifTvxAGLIMPqtBnOzZwO9z2rG6yO7VywIDylK728+HU55GUa4sq:3izWeIWAOdBh9g7Ez/FqU7

Score
8/10

Malware Config

Targets

    • Target

      be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07.exe

    • Size

      691KB

    • MD5

      0deec6c79c47e3224feaaaa2e70aa8a0

    • SHA1

      97d87e3fc3b3f00bcb715e774757d2c0b93e3718

    • SHA256

      be1046110b922bbe809bd0260b095cd571abc0376b1d3f716bd104401b20eb07

    • SHA512

      af8a24752b78b8b724ff94c926b35fec965423afe05daed99158dc371e6f79dfeed5666260e9969c5b306b15b08c0f6c6850d998b9661eec205dedf1408db22e

    • SSDEEP

      12288:NSlYifTvxAGLIMPqtBnOzZwO9z2rG6yO7VywIDylK728+HU55GUa4sq:3izWeIWAOdBh9g7Ez/FqU7

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks