General
-
Target
ff28113fae2c68df81308c8a1b8ec036959316aede6053bb0ddeff5983749b93
-
Size
592KB
-
Sample
240619-gbjcxazaqm
-
MD5
5f361b40aa790bd836b85afc6725609b
-
SHA1
89bbe552581318c7f3c2b2906c7120e10deda1f6
-
SHA256
ff28113fae2c68df81308c8a1b8ec036959316aede6053bb0ddeff5983749b93
-
SHA512
2395c8ec3ac83a09b200fc7bdbbe7e6b25945bb092558a95dbdfeddb0e7913bce70cf13c014aad3306214a7d0f453b52895966c3c6e7e1ed0dd5a0494f047543
-
SSDEEP
12288:wcWRJxhIUKofd9S88itJsL6s8GwUF81yn0FI/6IC0XoS+:TW/xhIUKofSytJsL6HUP0OHCb
Behavioral task
behavioral1
Sample
ff28113fae2c68df81308c8a1b8ec036959316aede6053bb0ddeff5983749b93.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ff28113fae2c68df81308c8a1b8ec036959316aede6053bb0ddeff5983749b93.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
ff28113fae2c68df81308c8a1b8ec036959316aede6053bb0ddeff5983749b93
-
Size
592KB
-
MD5
5f361b40aa790bd836b85afc6725609b
-
SHA1
89bbe552581318c7f3c2b2906c7120e10deda1f6
-
SHA256
ff28113fae2c68df81308c8a1b8ec036959316aede6053bb0ddeff5983749b93
-
SHA512
2395c8ec3ac83a09b200fc7bdbbe7e6b25945bb092558a95dbdfeddb0e7913bce70cf13c014aad3306214a7d0f453b52895966c3c6e7e1ed0dd5a0494f047543
-
SSDEEP
12288:wcWRJxhIUKofd9S88itJsL6s8GwUF81yn0FI/6IC0XoS+:TW/xhIUKofSytJsL6HUP0OHCb
Score10/10-
UPX dump on OEP (original entry point)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-