General
-
Target
Elsa.exe
-
Size
1.7MB
-
Sample
240925-qpr2msxfkp
-
MD5
357b90b97177f4c2689266f47a99ae74
-
SHA1
8d4fd39a6dc65fb080b38f7907f256c2e6bcff2b
-
SHA256
1f5e2e15e2d09dd85380f2bd361d27f6dbd4c8c7f6fe270a54df1bfe3ba853c3
-
SHA512
f6b19de06515536eec9e06a4c7de0359ebb6b3a2ce1d98fd51f49dcfb7e37ed57bbb3f642701b2d3712ee5c1438fa4009e703de721c4957b7e70f2f2919806d1
-
SSDEEP
3072:tahKyd2n31G5vWp1icKAArDZz4N9GhbkENEk3b:tahOXp0yN90vE
Static task
static1
Malware Config
Targets
-
-
Target
Elsa.exe
-
Size
1.7MB
-
MD5
357b90b97177f4c2689266f47a99ae74
-
SHA1
8d4fd39a6dc65fb080b38f7907f256c2e6bcff2b
-
SHA256
1f5e2e15e2d09dd85380f2bd361d27f6dbd4c8c7f6fe270a54df1bfe3ba853c3
-
SHA512
f6b19de06515536eec9e06a4c7de0359ebb6b3a2ce1d98fd51f49dcfb7e37ed57bbb3f642701b2d3712ee5c1438fa4009e703de721c4957b7e70f2f2919806d1
-
SSDEEP
3072:tahKyd2n31G5vWp1icKAArDZz4N9GhbkENEk3b:tahOXp0yN90vE
-
DarkTrack payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-