General
-
Target
93edf6e7c86560270aa99b18e7a14b7d39414827c0a1f4b428e2fce54426244bN
-
Size
66KB
-
Sample
241002-ymlqvatejk
-
MD5
bcb906edd2a32c0a3c8d9aa5dac93800
-
SHA1
fd4d7f757ae7ff2698850fcdbb07c4c8bf0c4a1a
-
SHA256
93edf6e7c86560270aa99b18e7a14b7d39414827c0a1f4b428e2fce54426244b
-
SHA512
96e039b7593072b70ec5cf51d3746febf00942f091e5ce796e16e580c825d49384678e3b5e4c2c346f7f4f23b95f7db62ab51868986318c4c831ea176ed7030f
-
SSDEEP
768:b/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLp9z:bRsvcdcQjosnvnZ6LQ1Ep9z
Static task
static1
Behavioral task
behavioral1
Sample
93edf6e7c86560270aa99b18e7a14b7d39414827c0a1f4b428e2fce54426244bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
93edf6e7c86560270aa99b18e7a14b7d39414827c0a1f4b428e2fce54426244bN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Targets
-
-
Target
93edf6e7c86560270aa99b18e7a14b7d39414827c0a1f4b428e2fce54426244bN
-
Size
66KB
-
MD5
bcb906edd2a32c0a3c8d9aa5dac93800
-
SHA1
fd4d7f757ae7ff2698850fcdbb07c4c8bf0c4a1a
-
SHA256
93edf6e7c86560270aa99b18e7a14b7d39414827c0a1f4b428e2fce54426244b
-
SHA512
96e039b7593072b70ec5cf51d3746febf00942f091e5ce796e16e580c825d49384678e3b5e4c2c346f7f4f23b95f7db62ab51868986318c4c831ea176ed7030f
-
SSDEEP
768:b/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLp9z:bRsvcdcQjosnvnZ6LQ1Ep9z
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-