General
-
Target
PO Copy_7854569.exe
-
Size
698KB
-
Sample
240523-qg8z7acf74
-
MD5
1a446464ce98784973a5e7bd13190a5b
-
SHA1
d4a5f07d3259338ec8ac7c84dc387dd0ea581b6b
-
SHA256
dcda4d5b1eba2327c178aad5f4237e22934841cd6d7ad116c2cb1622d6e9673b
-
SHA512
cb39b7dbcac0f6d1319ea70a589add07be9f2911e255dc21bb8364dfd36143283c8dacc444515ad0184d5bba2cdb37180d4325f57d7fa90060620292b0824783
-
SSDEEP
12288:e5dxtiqsXrn+yqXRYhJ6rRz4NxufdfwVfZohEViROrEn1FMG:e5pbsXrnowHdZohEAKED
Static task
static1
Behavioral task
behavioral1
Sample
PO Copy_7854569.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO Copy_7854569.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
PO Copy_7854569.exe
-
Size
698KB
-
MD5
1a446464ce98784973a5e7bd13190a5b
-
SHA1
d4a5f07d3259338ec8ac7c84dc387dd0ea581b6b
-
SHA256
dcda4d5b1eba2327c178aad5f4237e22934841cd6d7ad116c2cb1622d6e9673b
-
SHA512
cb39b7dbcac0f6d1319ea70a589add07be9f2911e255dc21bb8364dfd36143283c8dacc444515ad0184d5bba2cdb37180d4325f57d7fa90060620292b0824783
-
SSDEEP
12288:e5dxtiqsXrn+yqXRYhJ6rRz4NxufdfwVfZohEViROrEn1FMG:e5pbsXrnowHdZohEAKED
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-