General
-
Target
1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e
-
Size
574KB
-
Sample
241005-xtxw1svbqf
-
MD5
343e37c5a1931c2e475fbef2b341187a
-
SHA1
7f1f4be94a2b31d9971f73fdf33b05951f8c89a1
-
SHA256
1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e
-
SHA512
9214260e69ff5e9182a991b61eb6657f44c74367a6c4b525b0d7bd06319e9f540043652bb0fdc9772f64cb4d2d0f8630b8c4babdd44c1d2db234d0c885bf1505
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubX:zFhWAfn22m0eD1GPz8HdxT
Static task
static1
Behavioral task
behavioral1
Sample
1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e
-
Size
574KB
-
MD5
343e37c5a1931c2e475fbef2b341187a
-
SHA1
7f1f4be94a2b31d9971f73fdf33b05951f8c89a1
-
SHA256
1d63c69be3d63e89252f1294f7488a3ba461bce5470a84e9b6edbeb02bb0e20e
-
SHA512
9214260e69ff5e9182a991b61eb6657f44c74367a6c4b525b0d7bd06319e9f540043652bb0fdc9772f64cb4d2d0f8630b8c4babdd44c1d2db234d0c885bf1505
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3HdsubX:zFhWAfn22m0eD1GPz8HdxT
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-