General
-
Target
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9
-
Size
46KB
-
Sample
240824-ep3btstgpk
-
MD5
bdbbf93e2c50334ac9c1b9aa5e4898a3
-
SHA1
9b60f8d0f90b6012787efc8516446fe1454cb275
-
SHA256
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9
-
SHA512
ca050147ccc90df15716051b9b0d6cc7d92baadab4d53c76ca44c8e5c6ba5e01a1e636b99cdbfebbcbe44b6cf75a72a59a24eec7cc4a2bfdee3fcf2b5d8c239d
-
SSDEEP
768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYi6KT8:zI0OGrOy6NvSpMZVQ1J4KT8
Static task
static1
Behavioral task
behavioral1
Sample
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Targets
-
-
Target
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9
-
Size
46KB
-
MD5
bdbbf93e2c50334ac9c1b9aa5e4898a3
-
SHA1
9b60f8d0f90b6012787efc8516446fe1454cb275
-
SHA256
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9
-
SHA512
ca050147ccc90df15716051b9b0d6cc7d92baadab4d53c76ca44c8e5c6ba5e01a1e636b99cdbfebbcbe44b6cf75a72a59a24eec7cc4a2bfdee3fcf2b5d8c239d
-
SSDEEP
768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYi6KT8:zI0OGrOy6NvSpMZVQ1J4KT8
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-