General
-
Target
13072024_0302_12072024_POM2223.gz
-
Size
668KB
-
Sample
240713-djwresvgng
-
MD5
d469bda56089256ed7a0dd762f360b58
-
SHA1
200d55ec976e62c86298509c5c69fce9907bb0ff
-
SHA256
f9e53a9a2543e22e668248b2526ab1fcf1d0a4ec8580e623021019ca00f97578
-
SHA512
6e4f95085cb8980eb818aeeb7032193a5e10ddd33289d3722baf1886c0ad8b7d261bf731c030dd77dff1f8b378b1dc4273c73597c364e803a51382fad5512172
-
SSDEEP
12288:WDUGxL1BvS5RNrxj2B4rccoemM08/9Pm5g7OnWMx48NMHW/iH9Wf0MqP3m:WK5RfjW4r4lp8VPmCipx48NM2/iHNMSm
Static task
static1
Behavioral task
behavioral1
Sample
POM2223/POM2223.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
POM2223/POM2223.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
POM2223/POM2223.exe
-
Size
719KB
-
MD5
cca00dca04a26d14770e0cde89c49bf2
-
SHA1
cb271403ac47e1159259894f509320b1b4d1e9ed
-
SHA256
c565b70146700bac34f82ce87ac6c2417211d04db7ba8433d9bcd8ca2e15a5ed
-
SHA512
90461c8440b985e3ca37eaa014e0ca66496f6160dc7e53bff30aa5d9e1d7f62bc02303e708f73d77e1825a7ec8f8c533f779a1050da14e8eeaa750812259af77
-
SSDEEP
12288:S72iNmz6sXqg9zdl9FB6yh+myDWfQoME2Csa5RSvr7vsxdEJ4SBoBioNb/IPesIf:S71ZsXqgXl9F3NJxsa58HvUq4HBRqbi
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-