General
-
Target
File.rar
-
Size
3.5MB
-
Sample
240829-nw8a4a1hkr
-
MD5
79125226647a9467d34237825e6f6ea2
-
SHA1
364711e43aa15b5432396d65c0850ffe4051775f
-
SHA256
b936dc76c796a7ec52e4ecae7c99f3982236c23aa163150f906191ea6a73a460
-
SHA512
de89cd0f0974b3822e21932250c87f0a14535f7777afa64dfc856f086da184ebc065e768cb0ffa78fdcc9a5a205d3031054af305b32c8c505c36387f38c28df4
-
SSDEEP
98304:aAcPXz0WNZG1GI2zMlj//0CrdMaMqJt5Q+2e:aDAlb8odeUtqxe
Static task
static1
Behavioral task
behavioral1
Sample
File.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
File.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
File.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
File.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
File.exe
-
Size
718.9MB
-
MD5
73c8eb7e19903a2148c890715f2e3200
-
SHA1
897f8a804ec7799462f8240a3ac9618f3f03ed04
-
SHA256
002cffcc6cd7faf2340d1daa3698cba35d8e78b181ad64c0683a60a151dd19d4
-
SHA512
24e298ba4a2e967f55b974e39f1bb2bb552a143e835105434e9fc2c5a4f42f1df47731d0e046982006d35d87f58005aa756b475313d9308f56db488b98f1330c
-
SSDEEP
12582912:umuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuH:Y
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-