General
-
Target
Connect.application
-
Size
12KB
-
Sample
240705-kjydksxhje
-
MD5
221f94b0fbcebdc9611eb8e702346bdd
-
SHA1
6c784d3ac5dd3c42f3626b6d4c8c1a569c5e8f50
-
SHA256
f7ee0c3c731a03dedf85551608eac5195e53b2de1f5d8cd9dbb7b5fd728bba2b
-
SHA512
991fedbe32afcf830793e652292912a97287ad7e89b989a71a4b6655392e178341e2d531d84a94cd7914fa5e5475fce6db81da0e7e95706b6d8094b59b3f83da
-
SSDEEP
192:okcfjCdShmMoqDvOb2x2QPyisNB/EDh7BqWoUA:pdody/QPp6B/M7Y7
Static task
static1
Behavioral task
behavioral1
Sample
Connect.application
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
Connect.application
-
Size
12KB
-
MD5
221f94b0fbcebdc9611eb8e702346bdd
-
SHA1
6c784d3ac5dd3c42f3626b6d4c8c1a569c5e8f50
-
SHA256
f7ee0c3c731a03dedf85551608eac5195e53b2de1f5d8cd9dbb7b5fd728bba2b
-
SHA512
991fedbe32afcf830793e652292912a97287ad7e89b989a71a4b6655392e178341e2d531d84a94cd7914fa5e5475fce6db81da0e7e95706b6d8094b59b3f83da
-
SSDEEP
192:okcfjCdShmMoqDvOb2x2QPyisNB/EDh7BqWoUA:pdody/QPp6B/M7Y7
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-