General
-
Target
24d958acf8e2ab0261d207c241dc6a927d7f1d2c460d4ff5bdad4d14c37c8ac0
-
Size
7.3MB
-
Sample
240703-gq169szhpc
-
MD5
00f35b3a1dd8c03b0a23c3a3b5535073
-
SHA1
ee79fa79d9a2241c0dbb5d22fdf7897c76a2e057
-
SHA256
24d958acf8e2ab0261d207c241dc6a927d7f1d2c460d4ff5bdad4d14c37c8ac0
-
SHA512
4593c75a3ce8dbe745def352e78580d465b8d48a8fb3c1234ca198b235b6bd22a6526faebb680b942e0c42c92343150a37f328bbf15b9c444723f84e4ae9b109
-
SSDEEP
196608:91OgLCXoq3bkclTgC2lCBqWMQLa1Mm1gWD3n7Sx:3Oge3bk60lCytJDq
Static task
static1
Behavioral task
behavioral1
Sample
24d958acf8e2ab0261d207c241dc6a927d7f1d2c460d4ff5bdad4d14c37c8ac0.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
24d958acf8e2ab0261d207c241dc6a927d7f1d2c460d4ff5bdad4d14c37c8ac0
-
Size
7.3MB
-
MD5
00f35b3a1dd8c03b0a23c3a3b5535073
-
SHA1
ee79fa79d9a2241c0dbb5d22fdf7897c76a2e057
-
SHA256
24d958acf8e2ab0261d207c241dc6a927d7f1d2c460d4ff5bdad4d14c37c8ac0
-
SHA512
4593c75a3ce8dbe745def352e78580d465b8d48a8fb3c1234ca198b235b6bd22a6526faebb680b942e0c42c92343150a37f328bbf15b9c444723f84e4ae9b109
-
SSDEEP
196608:91OgLCXoq3bkclTgC2lCBqWMQLa1Mm1gWD3n7Sx:3Oge3bk60lCytJDq
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-