General
-
Target
1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731
-
Size
88KB
-
Sample
240525-x3vs1sfc5w
-
MD5
517ecb98b76239885324b2e7c7f1be97
-
SHA1
69e7f9332a42febc6224828d5ffbaeb00a88338a
-
SHA256
1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731
-
SHA512
375128f08eaee049b4a4302923b43a6a14b76403bedc27a3d61c592124fce5a08f7ecf78aa1beb0d2b074f4f2ad69c1394b9f9bda1c880600a2d536b0952e3af
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEu:6D0ctAVA/bmxIMnoKjyR/Nu
Static task
static1
Behavioral task
behavioral1
Sample
1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731
-
Size
88KB
-
MD5
517ecb98b76239885324b2e7c7f1be97
-
SHA1
69e7f9332a42febc6224828d5ffbaeb00a88338a
-
SHA256
1e9feb0a8a2799919d35b85321d8ea5c618dab497d4e72ca9443c91f154e6731
-
SHA512
375128f08eaee049b4a4302923b43a6a14b76403bedc27a3d61c592124fce5a08f7ecf78aa1beb0d2b074f4f2ad69c1394b9f9bda1c880600a2d536b0952e3af
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEu:6D0ctAVA/bmxIMnoKjyR/Nu
Score9/10-
UPX dump on OEP (original entry point)
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-