General
-
Target
e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b.dll
-
Size
24.8MB
-
Sample
241001-nyfzmaxfrq
-
MD5
50c424218307e9cb81ce2b1febbbc9a4
-
SHA1
f57ddd3ac726bfa59de0edf309edac4d63c3bdae
-
SHA256
e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b
-
SHA512
a2eb3eb990685657811839cf3d6af582e8a8341615f28601c14f0d709f979b8d2db20f70b2aa5564d081bd5e60956e55546fa7b0214a0692aa60d14df2d40f3d
-
SSDEEP
393216:+iCfMh8Pf/v3ye4CJjQTqi9YnVDpzeH6aNtpJMjNzkoy4mF:kUhe/vLXxSaDF2NtjOZy4O
Static task
static1
Behavioral task
behavioral1
Sample
e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b.dll
Resource
win10v2004-20240910-en
Malware Config
Targets
-
-
Target
e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b.dll
-
Size
24.8MB
-
MD5
50c424218307e9cb81ce2b1febbbc9a4
-
SHA1
f57ddd3ac726bfa59de0edf309edac4d63c3bdae
-
SHA256
e07dbe17a3ef5f5d09629da0d34d077166d3d1e0caec94f6c5b46f8dfb92228b
-
SHA512
a2eb3eb990685657811839cf3d6af582e8a8341615f28601c14f0d709f979b8d2db20f70b2aa5564d081bd5e60956e55546fa7b0214a0692aa60d14df2d40f3d
-
SSDEEP
393216:+iCfMh8Pf/v3ye4CJjQTqi9YnVDpzeH6aNtpJMjNzkoy4mF:kUhe/vLXxSaDF2NtjOZy4O
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1