General
-
Target
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.zip
-
Size
91KB
-
Sample
240904-h651tsxfne
-
MD5
b1fceb117ac59877219f44e890a9c65a
-
SHA1
4bfd17dc3097f9efe6e30b7273a8736921de1431
-
SHA256
19d54644787bfe38031a1e670be4aec6dbb23431a19d8f59b7c60339e99088e9
-
SHA512
60b067aa7092af2d31f7e24d2905356463efc2e1299c2ff900edf963e1f063f29aadf5d5f453b3e1566e67af698115d03aa970ec5dd41bc0ea67c717dbd81eac
-
SSDEEP
1536:vyzbF0H2K2sRWSj5NxY0E5qroMoYiDXD+99JjGAKzrea7w4KjOJS:ix02CRWau0toYUS99QADCYOA
Behavioral task
behavioral1
Sample
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.exe
-
Size
392KB
-
MD5
9e9818f5a14d0ff1b45d75493930695f
-
SHA1
f7a7f1d59adb83febc9a75e6ba68003946025923
-
SHA256
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62
-
SHA512
cbb07fb22c629fa30f79f7fdccb316df78b244d4d36f346a03ebfd90862e3338b79fbf4d2c9eeeb512eb5ab12d54a88a5578d16c7719e8ad9c1c3c5fe4b45dd5
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-