General
-
Target
2361169d401e7b2c556f3c1ea6bcd3e13a74a6109e5e0c5dabd1e7ab62186be3N
-
Size
200KB
-
Sample
241005-ajdztsthkk
-
MD5
156d14e0b53853caefbb522d98d80700
-
SHA1
0b1d467358ba8c916819da5685e43173a548d4aa
-
SHA256
2361169d401e7b2c556f3c1ea6bcd3e13a74a6109e5e0c5dabd1e7ab62186be3
-
SHA512
c7ebde03860c637ea9b99a8619711e186dcd4e8a4589e7d845dcf5b5d4c5a9c2eec028f4c37ce80abe92b16d425fe51ee8a3b474dc863341f0ed264ae3ea242e
-
SSDEEP
1536:2ChrVkT1hoxJTxRcTGJNOJh1n/O+yCx9Fs/i7sUtnRvJ:VB2Tna3bq1n99K/i7tR
Behavioral task
behavioral1
Sample
2361169d401e7b2c556f3c1ea6bcd3e13a74a6109e5e0c5dabd1e7ab62186be3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2361169d401e7b2c556f3c1ea6bcd3e13a74a6109e5e0c5dabd1e7ab62186be3N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2361169d401e7b2c556f3c1ea6bcd3e13a74a6109e5e0c5dabd1e7ab62186be3N
-
Size
200KB
-
MD5
156d14e0b53853caefbb522d98d80700
-
SHA1
0b1d467358ba8c916819da5685e43173a548d4aa
-
SHA256
2361169d401e7b2c556f3c1ea6bcd3e13a74a6109e5e0c5dabd1e7ab62186be3
-
SHA512
c7ebde03860c637ea9b99a8619711e186dcd4e8a4589e7d845dcf5b5d4c5a9c2eec028f4c37ce80abe92b16d425fe51ee8a3b474dc863341f0ed264ae3ea242e
-
SSDEEP
1536:2ChrVkT1hoxJTxRcTGJNOJh1n/O+yCx9Fs/i7sUtnRvJ:VB2Tna3bq1n99K/i7tR
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1