General
-
Target
670c19b4bec9043270fe79012bf64fcbfdd8b5f92f463d3dc8a7549dcfdb990a
-
Size
7.3MB
-
Sample
240613-24lc7ayarj
-
MD5
c58a42b24ca9ee97a9824866fa1cae61
-
SHA1
beb843adfab52dda17fa74bac69bdc1c19b460f0
-
SHA256
670c19b4bec9043270fe79012bf64fcbfdd8b5f92f463d3dc8a7549dcfdb990a
-
SHA512
fcd45c46f0bef09800dc96dd212f3410d2d79c0fe4e9fa584d40712936e034325d800ac79c738f312e8e0f9ce8e8a2980f617991105c5f0b1ba55d48e02774e6
-
SSDEEP
196608:91OtK5MJisRwVEXYIniUoif59LjgcxjYX0g33tMp/UUi/1:3Oti+sEliUJxNjgc5MCR3it
Static task
static1
Behavioral task
behavioral1
Sample
670c19b4bec9043270fe79012bf64fcbfdd8b5f92f463d3dc8a7549dcfdb990a.exe
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
670c19b4bec9043270fe79012bf64fcbfdd8b5f92f463d3dc8a7549dcfdb990a
-
Size
7.3MB
-
MD5
c58a42b24ca9ee97a9824866fa1cae61
-
SHA1
beb843adfab52dda17fa74bac69bdc1c19b460f0
-
SHA256
670c19b4bec9043270fe79012bf64fcbfdd8b5f92f463d3dc8a7549dcfdb990a
-
SHA512
fcd45c46f0bef09800dc96dd212f3410d2d79c0fe4e9fa584d40712936e034325d800ac79c738f312e8e0f9ce8e8a2980f617991105c5f0b1ba55d48e02774e6
-
SSDEEP
196608:91OtK5MJisRwVEXYIniUoif59LjgcxjYX0g33tMp/UUi/1:3Oti+sEliUJxNjgc5MCR3it
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-