General
-
Target
DOWNLOAD_FISCALIA.7z.TAR
-
Size
3.6MB
-
Sample
240608-x2fygafa51
-
MD5
a3f0035f031d29176da9b625e9f2bc5c
-
SHA1
e1dd6d44b4fafe8859ce3719a19ff77d20a3fc8d
-
SHA256
0eecc02ff7006649bb121c4d633a2390df030922aa6a90bf86532ff88579e438
-
SHA512
2018d0aca64b6be492f78afef0c98b7bb708aa67fbf3bdddd0c933ef79e76e7dbdff430f6404c39c962f9c2d39d517b536925ef8ac290d64f05950ab0a4a0794
-
SSDEEP
98304:L2oGCDpZqnOfrpvys5P2jpmRnzBQTjs0/2v:LpDfqnOfdvys59RlQTjs00
Static task
static1
Behavioral task
behavioral1
Sample
DOWNLOAD_FISCALIA.7z
Resource
win10v2004-20240508-en
Malware Config
Extracted
https://cdn.discordapp.com/attachments/1248657150990094369/1248657204006092810/Ated.vbs?ex=66647624&is=666324a4&hm=aea9cf7c4eb17264b568dd7b82f5c5863dda26b576184a36841fd087f223c924&
Targets
-
-
Target
DOWNLOAD_FISCALIA.7z.TAR
-
Size
3.6MB
-
MD5
a3f0035f031d29176da9b625e9f2bc5c
-
SHA1
e1dd6d44b4fafe8859ce3719a19ff77d20a3fc8d
-
SHA256
0eecc02ff7006649bb121c4d633a2390df030922aa6a90bf86532ff88579e438
-
SHA512
2018d0aca64b6be492f78afef0c98b7bb708aa67fbf3bdddd0c933ef79e76e7dbdff430f6404c39c962f9c2d39d517b536925ef8ac290d64f05950ab0a4a0794
-
SSDEEP
98304:L2oGCDpZqnOfrpvys5P2jpmRnzBQTjs0/2v:LpDfqnOfdvys59RlQTjs00
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-