General
-
Target
archive.zip
-
Size
13.1MB
-
Sample
240808-wd3a5awhjl
-
MD5
270ca907e16b6c7d3d2c4c65509772a3
-
SHA1
87623209e0aca83dc387eef5ebd09a467df20905
-
SHA256
b58655503a5b1247394999eb674c1133a1886cbd670f831210fde9c81fd565ba
-
SHA512
65a62469256359843756c184d5e759a3406400dc31d96443107d944a77f7a72a999a4de6d1744929ce854e6d6392b741bebc3988d1043dcb11b7f61e466f7b00
-
SSDEEP
196608:FiccpT7/3NLE6F99uyhpoegJ9uyhpoeg2ACobb4VjqdDtIpR3yEp79Yax:Y7/do6F99u4oH9u4onCtV/bPl
Static task
static1
Behavioral task
behavioral1
Sample
archive/AppFile.exe
Resource
win7-20240705-de
Behavioral task
behavioral2
Sample
archive/AppFile.exe
Resource
win10-20240404-de
Malware Config
Targets
-
-
Target
archive/AppFile.exe
-
Size
716.0MB
-
MD5
0bbd85dcd282a7fbe78c2ce3c97165ac
-
SHA1
e0e5a31d3ee971f0a7c98766d84c78bc3a31193a
-
SHA256
e682ed5c59779bc89389b243172f7f6b6372319820e8f65aefdd93c0a1a3be33
-
SHA512
3ac34ae372651b5b8a0ac41699633a969158505cd1e429d5312a052ba621bda2cb823bffb4d0333390a6c31a9407bb44b162997ee4348682732b09dc6d820da2
-
SSDEEP
98304:mSdaaItMOwNcT43nfPk4fqUgL0r+pOEMpDclH:7du6OE3fLXrbEyD
-
Modifies firewall policy service
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-