General
-
Target
d3b92e17ac4b5a253ae903407f723f37137004806d6b7dd569e15e9827a9b46a
-
Size
7.3MB
-
Sample
240722-np1yfavgrg
-
MD5
b93bbe4d057a980003459b1be8e959b2
-
SHA1
f950c84862116a62a2a82d13ef29a561351bc6d5
-
SHA256
d3b92e17ac4b5a253ae903407f723f37137004806d6b7dd569e15e9827a9b46a
-
SHA512
d7402400a9771870f933a21e1cab058d4835137386eff5ae07ac4ed13fc59c79f76f79e72c73b8b4530ceb2fa5a15b31a29a6a755643f8fffa6aae052dcf28ff
-
SSDEEP
196608:91OiT1fbRqyZrrxo4kmjpMd37wo9PujDQZ4ihsgw2f71U:3O8tqyZrmypMdrJ9N+iOgnq
Static task
static1
Behavioral task
behavioral1
Sample
d3b92e17ac4b5a253ae903407f723f37137004806d6b7dd569e15e9827a9b46a.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
d3b92e17ac4b5a253ae903407f723f37137004806d6b7dd569e15e9827a9b46a
-
Size
7.3MB
-
MD5
b93bbe4d057a980003459b1be8e959b2
-
SHA1
f950c84862116a62a2a82d13ef29a561351bc6d5
-
SHA256
d3b92e17ac4b5a253ae903407f723f37137004806d6b7dd569e15e9827a9b46a
-
SHA512
d7402400a9771870f933a21e1cab058d4835137386eff5ae07ac4ed13fc59c79f76f79e72c73b8b4530ceb2fa5a15b31a29a6a755643f8fffa6aae052dcf28ff
-
SSDEEP
196608:91OiT1fbRqyZrrxo4kmjpMd37wo9PujDQZ4ihsgw2f71U:3O8tqyZrmypMdrJ9N+iOgnq
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-