General
-
Target
358122718ba11b3e8bb56340dbe94f51.lnk
-
Size
56.2MB
-
Sample
240529-mdm2rsbc9s
-
MD5
358122718ba11b3e8bb56340dbe94f51
-
SHA1
0c61effe0c06d57835ead4a574dde992515b9382
-
SHA256
b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56
-
SHA512
7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01
-
SSDEEP
98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn
Behavioral task
behavioral1
Sample
358122718ba11b3e8bb56340dbe94f51.lnk
Resource
win7-20240419-en
Malware Config
Targets
-
-
Target
358122718ba11b3e8bb56340dbe94f51.lnk
-
Size
56.2MB
-
MD5
358122718ba11b3e8bb56340dbe94f51
-
SHA1
0c61effe0c06d57835ead4a574dde992515b9382
-
SHA256
b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56
-
SHA512
7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01
-
SSDEEP
98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn
-
Detect Rokrat payload
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-