General
-
Target
b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48
-
Size
10.5MB
-
Sample
240824-tzkxvsyfna
-
MD5
fce5a75331583fe3dc2bd49a4266824b
-
SHA1
6f390bebb84407e153b8975fe6576a0263e92b03
-
SHA256
b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48
-
SHA512
de77d6a88c899b978bde7bf83fa27e5344e9e44d9ffdd91e8601de5278f2beeaae79c70261c0de30f2685aa71f94cdd442d1de3789e1fdb960437472368f9424
-
SSDEEP
196608:WrxHqiSSJ7PbDdh0HtQba8z1sjzkAilU4I4:WrxX5J7PbDjOQba8psjzyz
Static task
static1
Behavioral task
behavioral1
Sample
b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48
-
Size
10.5MB
-
MD5
fce5a75331583fe3dc2bd49a4266824b
-
SHA1
6f390bebb84407e153b8975fe6576a0263e92b03
-
SHA256
b8553fc2afb30c5e1f6e4335fe2063fa6252f884b9a061947d2deb5d098fcd48
-
SHA512
de77d6a88c899b978bde7bf83fa27e5344e9e44d9ffdd91e8601de5278f2beeaae79c70261c0de30f2685aa71f94cdd442d1de3789e1fdb960437472368f9424
-
SSDEEP
196608:WrxHqiSSJ7PbDdh0HtQba8z1sjzkAilU4I4:WrxX5J7PbDjOQba8psjzyz
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1