General
-
Target
Charow.exe
-
Size
62.4MB
-
Sample
240616-zqjw4a1fpm
-
MD5
40a4b9668de52092f5eef20775d9b57f
-
SHA1
192e04f2c4b090f804be306f4280a521830306d3
-
SHA256
0aff087928d14356155c8106b1942a5938c54f9341368cdaf77bed71f0656ca3
-
SHA512
2bb4e70820b1dcb141ad1678ac78d6d48f4629c65635e70bb7066f21b557e6dc9b0cf3e64c7ad526303bf9ad03a258326572f7433178375ac64ab169cbcb3f1f
-
SSDEEP
1572864:nm6fAPvMbBMBL2nQygZNbvZrfFYC7jVdleLWiHx6w2W7N7fNJ:m6fivCM9UgbBFYWRH8WiHX3pJ
Static task
static1
Behavioral task
behavioral1
Sample
Charow.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Charow.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Charow.exe
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
Charow.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Charow.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Charow.exe
-
Size
62.4MB
-
MD5
40a4b9668de52092f5eef20775d9b57f
-
SHA1
192e04f2c4b090f804be306f4280a521830306d3
-
SHA256
0aff087928d14356155c8106b1942a5938c54f9341368cdaf77bed71f0656ca3
-
SHA512
2bb4e70820b1dcb141ad1678ac78d6d48f4629c65635e70bb7066f21b557e6dc9b0cf3e64c7ad526303bf9ad03a258326572f7433178375ac64ab169cbcb3f1f
-
SSDEEP
1572864:nm6fAPvMbBMBL2nQygZNbvZrfFYC7jVdleLWiHx6w2W7N7fNJ:m6fivCM9UgbBFYWRH8WiHX3pJ
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Charow.exe
-
Size
140.1MB
-
MD5
635241963c80f1b340c65dfd306f554e
-
SHA1
859bab3fbcc146b573f20d9a42104fa15cd1a1f8
-
SHA256
50136550410d93d341dc6fadc1e895c8d661f46c11f4dae4aabcd9c553399f3b
-
SHA512
56ddb69e1d6f0d4309911c1549c45a11f7b6afda4529e266d8ea3620041742f381edb6e5acac031cf1cdd57b1c7b5c2877751bd3e5d19bd357ecfef7b829b70d
-
SSDEEP
1572864:42Cm7gJKfVjsPawuFHNwczWTeMkF7ZEk8bCkKbj:/aodJFek8+k
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-