General
-
Target
FACTURA07655670000.exe
-
Size
954KB
-
Sample
240710-gh1wjasckb
-
MD5
88d1b932294e7de67548c5b6b3ff0b6a
-
SHA1
656134eab5eaba39f66e377139a167a7f17e2055
-
SHA256
38fadfd8efeef9ec2c93f281a9c089687a8297421846bd3661160af5e9752ef1
-
SHA512
467dff90d25fa4f01c454e566294ab74cbada3635c290a06fd6b33455704d730b59c42de4ff2447b2d449e4e63c2b6f9937ae4f9cc17ff7f66f612c9227365b2
-
SSDEEP
24576:sTCBq8jt7SS2KlHSSqlZiOLmNZc3zfY98LCc6Cf4rewoKCu:ssFq6NZc3z7CLC23
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA07655670000.exe
Resource
win7-20240705-en
Malware Config
Extracted
darkcloud
- email_from
- email_to
Targets
-
-
Target
FACTURA07655670000.exe
-
Size
954KB
-
MD5
88d1b932294e7de67548c5b6b3ff0b6a
-
SHA1
656134eab5eaba39f66e377139a167a7f17e2055
-
SHA256
38fadfd8efeef9ec2c93f281a9c089687a8297421846bd3661160af5e9752ef1
-
SHA512
467dff90d25fa4f01c454e566294ab74cbada3635c290a06fd6b33455704d730b59c42de4ff2447b2d449e4e63c2b6f9937ae4f9cc17ff7f66f612c9227365b2
-
SSDEEP
24576:sTCBq8jt7SS2KlHSSqlZiOLmNZc3zfY98LCc6Cf4rewoKCu:ssFq6NZc3z7CLC23
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-