General
-
Target
b01b8eb0686158c104fce6d5c9f97fcd7c00d651cc58c822e363b2c7ca832ea4
-
Size
44KB
-
Sample
240525-cltt6sba2v
-
MD5
75ac8257a85361970301b807b54667f0
-
SHA1
b29a4ce37e9b1d9efa85f701ebc0d405a9e67dba
-
SHA256
b01b8eb0686158c104fce6d5c9f97fcd7c00d651cc58c822e363b2c7ca832ea4
-
SHA512
6222f671663c686730d46fb384349ecea7b30492a81491718184f0326b9f22b92fd947ab3702638b08b5a33092509cf9386bcbbae3083c0a42472e9e31680fd4
-
SSDEEP
384:CxL+q5r+PpHfXhUkKvI4QwjQ/vFJhheJ06oZrj/vBKDJZy/:ua4r+PpHfXGLOnNh8noR+U/
Behavioral task
behavioral1
Sample
b01b8eb0686158c104fce6d5c9f97fcd7c00d651cc58c822e363b2c7ca832ea4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b01b8eb0686158c104fce6d5c9f97fcd7c00d651cc58c822e363b2c7ca832ea4.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
b01b8eb0686158c104fce6d5c9f97fcd7c00d651cc58c822e363b2c7ca832ea4
-
Size
44KB
-
MD5
75ac8257a85361970301b807b54667f0
-
SHA1
b29a4ce37e9b1d9efa85f701ebc0d405a9e67dba
-
SHA256
b01b8eb0686158c104fce6d5c9f97fcd7c00d651cc58c822e363b2c7ca832ea4
-
SHA512
6222f671663c686730d46fb384349ecea7b30492a81491718184f0326b9f22b92fd947ab3702638b08b5a33092509cf9386bcbbae3083c0a42472e9e31680fd4
-
SSDEEP
384:CxL+q5r+PpHfXhUkKvI4QwjQ/vFJhheJ06oZrj/vBKDJZy/:ua4r+PpHfXGLOnNh8noR+U/
Score9/10-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-