General
-
Target
50048e6f2c92f251bfc87da636dbc73080669bf84b8c5737db5af7b4bd4c27acN
-
Size
1.6MB
-
Sample
240919-hqa6hswepr
-
MD5
4b98ac287e67eae4030bbc0c01a7a300
-
SHA1
f3faa45b998f0950b4718339e50ec09c6663079b
-
SHA256
50048e6f2c92f251bfc87da636dbc73080669bf84b8c5737db5af7b4bd4c27ac
-
SHA512
dbbbe9d57065f0acc4545758786cec67c10dc86e1f79c5ee26a2fe5b29fe427285ca0a158cc81523b261ca5ff2993bd22d01c524d2078183b169aa609a4b85fb
-
SSDEEP
49152:DAodtaG9kS2U84B+FLan9k5TRM9zleVjPSf:h/B1aS
Static task
static1
Behavioral task
behavioral1
Sample
50048e6f2c92f251bfc87da636dbc73080669bf84b8c5737db5af7b4bd4c27acN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50048e6f2c92f251bfc87da636dbc73080669bf84b8c5737db5af7b4bd4c27acN.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
50048e6f2c92f251bfc87da636dbc73080669bf84b8c5737db5af7b4bd4c27acN
-
Size
1.6MB
-
MD5
4b98ac287e67eae4030bbc0c01a7a300
-
SHA1
f3faa45b998f0950b4718339e50ec09c6663079b
-
SHA256
50048e6f2c92f251bfc87da636dbc73080669bf84b8c5737db5af7b4bd4c27ac
-
SHA512
dbbbe9d57065f0acc4545758786cec67c10dc86e1f79c5ee26a2fe5b29fe427285ca0a158cc81523b261ca5ff2993bd22d01c524d2078183b169aa609a4b85fb
-
SSDEEP
49152:DAodtaG9kS2U84B+FLan9k5TRM9zleVjPSf:h/B1aS
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-