General
-
Target
0466159525cb3fab5109b4067f0a429f9880275f7e37aee7b3311fb3356c59c9
-
Size
5.4MB
-
Sample
240614-www7tsvglp
-
MD5
4fcd5ffc44994df50e06a0889e149b31
-
SHA1
7561935356870ab77c4a83e728eba8e5804c68f5
-
SHA256
0466159525cb3fab5109b4067f0a429f9880275f7e37aee7b3311fb3356c59c9
-
SHA512
ca57e591a33c053d4a991ce5549d9d95107cc3651c64ec643d41ba3eb073fef236af46ecd1e09feb4342d5b7be3fba7195bdb0c6aa2bf49763f09e4cb99a1169
-
SSDEEP
98304:sLrUH+U8GRcZz1a6Fg6DfCOW66hNjyHkmrJv0Ihx7KM:wS+oRlmrFdjKM
Static task
static1
Behavioral task
behavioral1
Sample
0466159525cb3fab5109b4067f0a429f9880275f7e37aee7b3311fb3356c59c9.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0466159525cb3fab5109b4067f0a429f9880275f7e37aee7b3311fb3356c59c9.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
0466159525cb3fab5109b4067f0a429f9880275f7e37aee7b3311fb3356c59c9
-
Size
5.4MB
-
MD5
4fcd5ffc44994df50e06a0889e149b31
-
SHA1
7561935356870ab77c4a83e728eba8e5804c68f5
-
SHA256
0466159525cb3fab5109b4067f0a429f9880275f7e37aee7b3311fb3356c59c9
-
SHA512
ca57e591a33c053d4a991ce5549d9d95107cc3651c64ec643d41ba3eb073fef236af46ecd1e09feb4342d5b7be3fba7195bdb0c6aa2bf49763f09e4cb99a1169
-
SSDEEP
98304:sLrUH+U8GRcZz1a6Fg6DfCOW66hNjyHkmrJv0Ihx7KM:wS+oRlmrFdjKM
Score10/10-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with unregistered version of .NET Reactor
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1