General
-
Target
Z48Y4fAm0DxOb17eCRF4dmrbGqo92P_pqPYK8E_sRxM.bin
-
Size
12KB
-
Sample
240528-ybdwvshc9t
-
MD5
ada24747150059096a01eb647f90c0c1
-
SHA1
b14553a1f9073bb1b6a482eee268b622c186aa84
-
SHA256
678f18e1f026d03c4e6f5ede091178766adb1aaa3dd8ffa9a8f60af04fac4713
-
SHA512
11fc3f3a70402ad47b3dc4174ce04b7e784abbed4bdb13be4d8d73b5ce5a01bc8a02d3ac07f377b4998a888c0bf0b6bfc63c55fc9a95bdbe66308726dcaa2d55
-
SSDEEP
384:OdrMMwmeaPqtYXvVqpSz+Ihmn4LIwnqKjDWXytnqDUoBSWBxyKGGTjWNOiTl31RK:yNzrPqtYf8pE+S+
Static task
static1
Behavioral task
behavioral1
Sample
Z48Y4fAm0DxOb17eCRF4dmrbGqo92P_pqPYK8E_sRxM.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Z48Y4fAm0DxOb17eCRF4dmrbGqo92P_pqPYK8E_sRxM.js
Resource
win10v2004-20240508-en
Malware Config
Extracted
https://clientidif0ight.worldbinders.com/download-file/Jb14ACQQwSGYXuPx
Targets
-
-
Target
Z48Y4fAm0DxOb17eCRF4dmrbGqo92P_pqPYK8E_sRxM.bin
-
Size
12KB
-
MD5
ada24747150059096a01eb647f90c0c1
-
SHA1
b14553a1f9073bb1b6a482eee268b622c186aa84
-
SHA256
678f18e1f026d03c4e6f5ede091178766adb1aaa3dd8ffa9a8f60af04fac4713
-
SHA512
11fc3f3a70402ad47b3dc4174ce04b7e784abbed4bdb13be4d8d73b5ce5a01bc8a02d3ac07f377b4998a888c0bf0b6bfc63c55fc9a95bdbe66308726dcaa2d55
-
SSDEEP
384:OdrMMwmeaPqtYXvVqpSz+Ihmn4LIwnqKjDWXytnqDUoBSWBxyKGGTjWNOiTl31RK:yNzrPqtYf8pE+S+
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-