General
-
Target
7b50b7d5b644b601a71d3f78efd492f19f475e4deaa2cb0a559b715f3b10072c
-
Size
7.2MB
-
Sample
240613-3ds6saverf
-
MD5
7fa351fea86b9e73323d4a01ca5121b9
-
SHA1
16f222e7c0613de3e351a4a473534c7646a456bd
-
SHA256
7b50b7d5b644b601a71d3f78efd492f19f475e4deaa2cb0a559b715f3b10072c
-
SHA512
b087f19a4f2c9ec249f788b97e04dc5b33c9b10145f0e913557a0714c93b36f2da627a9e9730e533bd7ef15ba30f2d76cae3a73193b1b1be581b4d2be0c36596
-
SSDEEP
196608:91OH+nxz/wpMzMY8Z0yKcgGVIBQeHso1R7ynLsopb5q:3OHkwpMzMYs0l7Mo1R7ynLjnq
Static task
static1
Behavioral task
behavioral1
Sample
7b50b7d5b644b601a71d3f78efd492f19f475e4deaa2cb0a559b715f3b10072c.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
7b50b7d5b644b601a71d3f78efd492f19f475e4deaa2cb0a559b715f3b10072c
-
Size
7.2MB
-
MD5
7fa351fea86b9e73323d4a01ca5121b9
-
SHA1
16f222e7c0613de3e351a4a473534c7646a456bd
-
SHA256
7b50b7d5b644b601a71d3f78efd492f19f475e4deaa2cb0a559b715f3b10072c
-
SHA512
b087f19a4f2c9ec249f788b97e04dc5b33c9b10145f0e913557a0714c93b36f2da627a9e9730e533bd7ef15ba30f2d76cae3a73193b1b1be581b4d2be0c36596
-
SSDEEP
196608:91OH+nxz/wpMzMY8Z0yKcgGVIBQeHso1R7ynLsopb5q:3OHkwpMzMYs0l7Mo1R7ynLjnq
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-