General
-
Target
1Spoofer.exe
-
Size
6.0MB
-
Sample
240712-vfe3yathrf
-
MD5
f76deaa37a5a47ce1d09f85b404c83c8
-
SHA1
4e685ef3b7bb804a725072cb48f4399ca99a2bb0
-
SHA256
2edf6c79d7fd3024f87972f90eda1fea0ca905b2eab103160d1c6baf2aa44288
-
SHA512
474cc28c2f4cf30808145a158c4120246cdf5f48bca00167445cac8c54cdea8ef0ec53f35c5bfe59e0bb65c1d98aa58857b35ae1dd43be18d1b365331a5c3f5a
-
SSDEEP
196608:ln4KIjae3ILxvid+2G1H9CUj1oQZgPC7nrGG:V47H30b2G1EK1bZioKG
Static task
static1
Behavioral task
behavioral1
Sample
1Spoofer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1Spoofer.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
1Spoofer.exe
-
Size
6.0MB
-
MD5
f76deaa37a5a47ce1d09f85b404c83c8
-
SHA1
4e685ef3b7bb804a725072cb48f4399ca99a2bb0
-
SHA256
2edf6c79d7fd3024f87972f90eda1fea0ca905b2eab103160d1c6baf2aa44288
-
SHA512
474cc28c2f4cf30808145a158c4120246cdf5f48bca00167445cac8c54cdea8ef0ec53f35c5bfe59e0bb65c1d98aa58857b35ae1dd43be18d1b365331a5c3f5a
-
SSDEEP
196608:ln4KIjae3ILxvid+2G1H9CUj1oQZgPC7nrGG:V47H30b2G1EK1bZioKG
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-