General
-
Target
8ae1dd497c110caff8452910057e8531.bin
-
Size
631KB
-
Sample
240701-czrlzatcpb
-
MD5
cd2aa17740dbe40c4385c66a9f494636
-
SHA1
7983d071271a08f90c50b65799f730fc14081bf7
-
SHA256
b6cdfb0f3bfc1b2ebfd2dc54f654b8634d6138c25de415e4149386164aa240c8
-
SHA512
42a24a81f6c0709bb536300b112d4e26d65a6fa41c20647f56bc866d3b32fec87d3d501b2a2e413d10b820aab042950fe17db26bd41899075d1279d473ea4361
-
SSDEEP
12288:l8QSHd+4h3jTCyAK9X3j1ompz+TvOW0lgSqLyH6HJ3WIwxHW:CHdZTCy5X3j1NpST2FlIl9rYW
Static task
static1
Behavioral task
behavioral1
Sample
dc74ae7a70778659ee1f27f8e772ab2513299da34c7b2eabb866152e5588720b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
dc74ae7a70778659ee1f27f8e772ab2513299da34c7b2eabb866152e5588720b.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
dc74ae7a70778659ee1f27f8e772ab2513299da34c7b2eabb866152e5588720b.exe
-
Size
684KB
-
MD5
8ae1dd497c110caff8452910057e8531
-
SHA1
a0ac63280a17a5f2f0ed70ba9fcdce5d6307a319
-
SHA256
dc74ae7a70778659ee1f27f8e772ab2513299da34c7b2eabb866152e5588720b
-
SHA512
409d14e904609f8f8c1148dc110f2052999583ed031746b16060f918481e2d95e77510d891a5185f7c846c25511a145301309b17da6685dc37115f45d4ac5b44
-
SSDEEP
12288:j99glhqbCawo53B7mLnCloDS/jlygjsJ2spL7yubqldoSirLvQPZ6gNMLY7K:j3wiBEPDQjlNmL7rqldovvoMLY
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-