General
-
Target
599a8c2c177f0d468cb20ef6e6b2164914461ca2daa3a502ce5654ac06263497
-
Size
7.3MB
-
Sample
240530-2x153aea32
-
MD5
0c382059d2f9be5e147cc2cf5cd2a88b
-
SHA1
08476a90aa9e389d385b7239b80c559ac7315055
-
SHA256
599a8c2c177f0d468cb20ef6e6b2164914461ca2daa3a502ce5654ac06263497
-
SHA512
0470275935f184171529a6a091cc9d3e28232baa2a73778468ab0428a5a796cb89269fbfc50f651da708855d26d293dc67509c5e3a7cb03e6d48520948c870eb
-
SSDEEP
196608:91OROmYdad3DQWZh59E3kz/iyq9DJMeK+xvxeV8IxJ4jl:3ORtYEd3DpXPPJ4JM83OJS
Static task
static1
Behavioral task
behavioral1
Sample
599a8c2c177f0d468cb20ef6e6b2164914461ca2daa3a502ce5654ac06263497.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
599a8c2c177f0d468cb20ef6e6b2164914461ca2daa3a502ce5654ac06263497
-
Size
7.3MB
-
MD5
0c382059d2f9be5e147cc2cf5cd2a88b
-
SHA1
08476a90aa9e389d385b7239b80c559ac7315055
-
SHA256
599a8c2c177f0d468cb20ef6e6b2164914461ca2daa3a502ce5654ac06263497
-
SHA512
0470275935f184171529a6a091cc9d3e28232baa2a73778468ab0428a5a796cb89269fbfc50f651da708855d26d293dc67509c5e3a7cb03e6d48520948c870eb
-
SSDEEP
196608:91OROmYdad3DQWZh59E3kz/iyq9DJMeK+xvxeV8IxJ4jl:3ORtYEd3DpXPPJ4JM83OJS
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-