General
-
Target
85b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0
-
Size
119KB
-
Sample
240621-rq9hratcrb
-
MD5
b37058a1a6fa72cf11d4bda54e15790a
-
SHA1
b8663b93cac0b88168d207fd648da5c2f9b775de
-
SHA256
85b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0
-
SHA512
4848057ad580943a96e57713ca721ad3052001e8fd428651b08034592596f14e9396d0de970bdbffc552e104189aa81dfe7723bd13003637659198ec38fed818
-
SSDEEP
3072:taz/aDPGTGEFCgfOUs9b1sYbj9udwbtkJjT17WfCSL:ttyfOUs9b1jEE
Static task
static1
Behavioral task
behavioral1
Sample
85b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7010862109:AAH0zvA1le9OK12jNFxe-ZZxxdtz25wyhrs/sendMessage?chat_id=6011786716
Targets
-
-
Target
85b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0
-
Size
119KB
-
MD5
b37058a1a6fa72cf11d4bda54e15790a
-
SHA1
b8663b93cac0b88168d207fd648da5c2f9b775de
-
SHA256
85b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0
-
SHA512
4848057ad580943a96e57713ca721ad3052001e8fd428651b08034592596f14e9396d0de970bdbffc552e104189aa81dfe7723bd13003637659198ec38fed818
-
SSDEEP
3072:taz/aDPGTGEFCgfOUs9b1sYbj9udwbtkJjT17WfCSL:ttyfOUs9b1jEE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1