General
-
Target
b50256d170445853fc1e859e70bb01a959cb2cdc113f78c2b6177788a697f3bf
-
Size
576KB
-
Sample
240708-dpsxqazcnj
-
MD5
3d51eb515254bb58c1021b4365a6d267
-
SHA1
0a05703fb84daaa824457da0d0ba5ddbf9b590d6
-
SHA256
b50256d170445853fc1e859e70bb01a959cb2cdc113f78c2b6177788a697f3bf
-
SHA512
64ae7db0399d34909e51bf64b8546518010d2bd4079ffff5307ba70cfc31a2ceb71524195a8d64a43e18beb78b05b96e7eb76f79f7d7e1b71cce6f0e2011d1a1
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSi:+NWPkHlUfBgpuPdWzyuDTifgyWlP
Behavioral task
behavioral1
Sample
b50256d170445853fc1e859e70bb01a959cb2cdc113f78c2b6177788a697f3bf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b50256d170445853fc1e859e70bb01a959cb2cdc113f78c2b6177788a697f3bf.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
b50256d170445853fc1e859e70bb01a959cb2cdc113f78c2b6177788a697f3bf
-
Size
576KB
-
MD5
3d51eb515254bb58c1021b4365a6d267
-
SHA1
0a05703fb84daaa824457da0d0ba5ddbf9b590d6
-
SHA256
b50256d170445853fc1e859e70bb01a959cb2cdc113f78c2b6177788a697f3bf
-
SHA512
64ae7db0399d34909e51bf64b8546518010d2bd4079ffff5307ba70cfc31a2ceb71524195a8d64a43e18beb78b05b96e7eb76f79f7d7e1b71cce6f0e2011d1a1
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSi:+NWPkHlUfBgpuPdWzyuDTifgyWlP
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-