General
-
Target
2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210
-
Size
882KB
-
Sample
240929-hy8fzsxand
-
MD5
b062843886327f817d7cefb5f611a15e
-
SHA1
cdfab7d0a25683e0a5c78646f8ab01a66ce68b0a
-
SHA256
2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210
-
SHA512
15912eb2fc004c8b39b5b087c91b60554ca6c34e43ddf8688e8d36dac657c0186608142899d779e592ad24d38fc3314a10155175e0a3b9b5ece48d8d788c6d56
-
SSDEEP
12288:G4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgahFWkq9MmCS:G4lavt0LkLL9IMixoEgeahFWkq9MmCS
Static task
static1
Behavioral task
behavioral1
Sample
2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210
-
Size
882KB
-
MD5
b062843886327f817d7cefb5f611a15e
-
SHA1
cdfab7d0a25683e0a5c78646f8ab01a66ce68b0a
-
SHA256
2236cf20c22202d6ed6fd145e71aed609d157928b403aa5512ce57214146d210
-
SHA512
15912eb2fc004c8b39b5b087c91b60554ca6c34e43ddf8688e8d36dac657c0186608142899d779e592ad24d38fc3314a10155175e0a3b9b5ece48d8d788c6d56
-
SSDEEP
12288:G4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgahFWkq9MmCS:G4lavt0LkLL9IMixoEgeahFWkq9MmCS
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3