General
-
Target
a9bf1aad75c05487f354377e324a506f4bac15cd23976d92a842c56a3a757122
-
Size
7.3MB
-
Sample
240613-3wp7vazejp
-
MD5
05ff3df4891c23297d2f683cb399f027
-
SHA1
6feed9d9fe950a03c23c4f50536d596302731d62
-
SHA256
a9bf1aad75c05487f354377e324a506f4bac15cd23976d92a842c56a3a757122
-
SHA512
a04817abb238753f5859f027e54de2943fb8e1729da08bfdd21a51c4ddd71523704c60820b131a399116b951be6931246ab4b0cfafed7f4370541ddb9511f728
-
SSDEEP
196608:91OV6INhbIM8kTjvXDL8+3gFZ7h83pJAQoaLv9Jc6hH:3OV6OI4jvXDnQFZ7hQYQ9v5H
Static task
static1
Behavioral task
behavioral1
Sample
a9bf1aad75c05487f354377e324a506f4bac15cd23976d92a842c56a3a757122.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
a9bf1aad75c05487f354377e324a506f4bac15cd23976d92a842c56a3a757122
-
Size
7.3MB
-
MD5
05ff3df4891c23297d2f683cb399f027
-
SHA1
6feed9d9fe950a03c23c4f50536d596302731d62
-
SHA256
a9bf1aad75c05487f354377e324a506f4bac15cd23976d92a842c56a3a757122
-
SHA512
a04817abb238753f5859f027e54de2943fb8e1729da08bfdd21a51c4ddd71523704c60820b131a399116b951be6931246ab4b0cfafed7f4370541ddb9511f728
-
SSDEEP
196608:91OV6INhbIM8kTjvXDL8+3gFZ7h83pJAQoaLv9Jc6hH:3OV6OI4jvXDnQFZ7hQYQ9v5H
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-