General
-
Target
fdf493e7b3d599f645fe0ec1c2ef20f7040c31a028ac954ea6596d71a3a109e3N
-
Size
200KB
-
Sample
240920-rsh4ks1frn
-
MD5
e084a43630b34f1c1df862f965d51a10
-
SHA1
95add3670a38124d3ea0f79c6255287feb2844b2
-
SHA256
fdf493e7b3d599f645fe0ec1c2ef20f7040c31a028ac954ea6596d71a3a109e3
-
SHA512
4303687f83b76a99ab2b07edb7c11a2bf4f33b0c6e7363ccb5988ea1b9dd6c645a2426a67507fcfa4b296dc71ac1fb528a657d423f90ef52711b96edc7ba854f
-
SSDEEP
3072:2GqUIPOWeQyB/qM9djctpsO/r6ElSVN2x4N:BqUaONHBiM/4tKm
Static task
static1
Behavioral task
behavioral1
Sample
fdf493e7b3d599f645fe0ec1c2ef20f7040c31a028ac954ea6596d71a3a109e3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdf493e7b3d599f645fe0ec1c2ef20f7040c31a028ac954ea6596d71a3a109e3N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
smartz1337
Targets
-
-
Target
fdf493e7b3d599f645fe0ec1c2ef20f7040c31a028ac954ea6596d71a3a109e3N
-
Size
200KB
-
MD5
e084a43630b34f1c1df862f965d51a10
-
SHA1
95add3670a38124d3ea0f79c6255287feb2844b2
-
SHA256
fdf493e7b3d599f645fe0ec1c2ef20f7040c31a028ac954ea6596d71a3a109e3
-
SHA512
4303687f83b76a99ab2b07edb7c11a2bf4f33b0c6e7363ccb5988ea1b9dd6c645a2426a67507fcfa4b296dc71ac1fb528a657d423f90ef52711b96edc7ba854f
-
SSDEEP
3072:2GqUIPOWeQyB/qM9djctpsO/r6ElSVN2x4N:BqUaONHBiM/4tKm
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-