General
-
Target
4ukey-for-android.exe
-
Size
1.9MB
-
Sample
240612-d5rdtszdqb
-
MD5
f8cad25e19965dc3e550857dc8f69f3c
-
SHA1
eeaa1fc341a4a8b187db768ef75220441f3da675
-
SHA256
1c82457d6cc05d33ad8c11dfe7046ea1e51eaa6276138c7fc3e4ca63ce3b7ec3
-
SHA512
ce2a7cfc25b25395e3e9926f5bfa22d72f21f6dda1ba22d3803f64da8281d35e88c0fae1dfa20c14cb47473395a4928ca8f40a3aa33ea8ee98963dcaa8afd5c8
-
SSDEEP
49152:J1OOKgkBsWP5UXpv4k6rKRDTvhkIkpV9SIvkV8vhUm8Hlb1/a19gjmj:J1ZNKe54k6avvhkIAV9S3qvhUrHm19gA
Behavioral task
behavioral1
Sample
4ukey-for-android.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
4ukey-for-android.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
4ukey-for-android.exe
-
Size
1.9MB
-
MD5
f8cad25e19965dc3e550857dc8f69f3c
-
SHA1
eeaa1fc341a4a8b187db768ef75220441f3da675
-
SHA256
1c82457d6cc05d33ad8c11dfe7046ea1e51eaa6276138c7fc3e4ca63ce3b7ec3
-
SHA512
ce2a7cfc25b25395e3e9926f5bfa22d72f21f6dda1ba22d3803f64da8281d35e88c0fae1dfa20c14cb47473395a4928ca8f40a3aa33ea8ee98963dcaa8afd5c8
-
SSDEEP
49152:J1OOKgkBsWP5UXpv4k6rKRDTvhkIkpV9SIvkV8vhUm8Hlb1/a19gjmj:J1ZNKe54k6avvhkIAV9S3qvhUrHm19gA
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-