General
-
Target
f909ee497a8bd934b0518f1b2619cacf16ac87ef4a0ed74c2a41ef8be792ef16
-
Size
7.2MB
-
Sample
240705-xfxdbswanh
-
MD5
beb966ed947451195f3d024db4ed8375
-
SHA1
c31976cd5d2383fb48f21d9203b8f75f9f3dd958
-
SHA256
f909ee497a8bd934b0518f1b2619cacf16ac87ef4a0ed74c2a41ef8be792ef16
-
SHA512
69bb11d6c9246137c6c8f9b77ae94882294a7e483563d7f940b53cb87eae9240f11cae20df42adb378aea09911d24ccd4544cdb5704dc65fa2729deb5a8c30be
-
SSDEEP
196608:91OkFs62SnJA73m3msqKfLPXzQNXfrFZAmFL3b:3OkFBJD3XfLPDOf3L
Static task
static1
Behavioral task
behavioral1
Sample
f909ee497a8bd934b0518f1b2619cacf16ac87ef4a0ed74c2a41ef8be792ef16.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
f909ee497a8bd934b0518f1b2619cacf16ac87ef4a0ed74c2a41ef8be792ef16
-
Size
7.2MB
-
MD5
beb966ed947451195f3d024db4ed8375
-
SHA1
c31976cd5d2383fb48f21d9203b8f75f9f3dd958
-
SHA256
f909ee497a8bd934b0518f1b2619cacf16ac87ef4a0ed74c2a41ef8be792ef16
-
SHA512
69bb11d6c9246137c6c8f9b77ae94882294a7e483563d7f940b53cb87eae9240f11cae20df42adb378aea09911d24ccd4544cdb5704dc65fa2729deb5a8c30be
-
SSDEEP
196608:91OkFs62SnJA73m3msqKfLPXzQNXfrFZAmFL3b:3OkFBJD3XfLPDOf3L
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-