General
-
Target
a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2
-
Size
2.6MB
-
Sample
240708-n9ekyayajj
-
MD5
674b5e533d8bceaccfd18aa8e5c4d8a2
-
SHA1
93f23682811395754497bd5d1b941a5d60639f5b
-
SHA256
a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2
-
SHA512
a815641bb49171e2578e2d8d4b9d9ef9b2bbb372de40aa9e5400b70af1b0b62ccbf71ae77a87e07a8751eef904bc02f211e298fee3bd51aec9e7e4f94f94c640
-
SSDEEP
49152:Ii39+084E6W4W8Vm/hH49aXZmMAxPHdgjMzoQXinnLYHiWEWcHRqhBB:H+HVb4W8QZ49unMHdBXqDRHEBB
Static task
static1
Behavioral task
behavioral1
Sample
a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2
-
Size
2.6MB
-
MD5
674b5e533d8bceaccfd18aa8e5c4d8a2
-
SHA1
93f23682811395754497bd5d1b941a5d60639f5b
-
SHA256
a2283c410a6c147a7dbfc0624aaddf2b959d05dbad3d86ab87d19a1218d9d8f2
-
SHA512
a815641bb49171e2578e2d8d4b9d9ef9b2bbb372de40aa9e5400b70af1b0b62ccbf71ae77a87e07a8751eef904bc02f211e298fee3bd51aec9e7e4f94f94c640
-
SSDEEP
49152:Ii39+084E6W4W8Vm/hH49aXZmMAxPHdgjMzoQXinnLYHiWEWcHRqhBB:H+HVb4W8QZ49unMHdBXqDRHEBB
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-