General
-
Target
1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d.exe
-
Size
703KB
-
Sample
241009-gzslgs1dqf
-
MD5
79352e18cf7cccead2e377bfa01ff274
-
SHA1
4819ae220c6b1f0c510a67e84c56d6caba21801a
-
SHA256
1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d
-
SHA512
fe8f7524fb90592a971aea0c5fcd16164773f78e39687d109e00eca0d03e4cac814f9f27cd286556dfbc2f0aa46d253aabd5b2a8a0d1ab33037432faa029a62e
-
SSDEEP
12288:1OSQt+Z2v21fza2exTt+OCdsbtf1lVfKeo64m4a8xmskO28iJbMS8FCuSJX6Cfdf:10t+Z2eMx0NWxf1lVfKF93xxmsoJ6FCB
Static task
static1
Behavioral task
behavioral1
Sample
1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d.exe
-
Size
703KB
-
MD5
79352e18cf7cccead2e377bfa01ff274
-
SHA1
4819ae220c6b1f0c510a67e84c56d6caba21801a
-
SHA256
1c6373c0359b33c59e1a2a42749e5b52416753441cc992134d2ff6eb3a50898d
-
SHA512
fe8f7524fb90592a971aea0c5fcd16164773f78e39687d109e00eca0d03e4cac814f9f27cd286556dfbc2f0aa46d253aabd5b2a8a0d1ab33037432faa029a62e
-
SSDEEP
12288:1OSQt+Z2v21fza2exTt+OCdsbtf1lVfKeo64m4a8xmskO28iJbMS8FCuSJX6Cfdf:10t+Z2eMx0NWxf1lVfKF93xxmsoJ6FCB
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-