General
-
Target
d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce
-
Size
576KB
-
Sample
241019-ednz3axerk
-
MD5
f678e5e1ae32254392d2db37e5753bc5
-
SHA1
b3a22c78e65ed29359a30695e57358c8c5279c8d
-
SHA256
d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce
-
SHA512
5c7ef7dc0f9b059b7c5f08d7a321e198e67427aeb26ba6d9acae82f0ee2a90ba7087df4ae25911316a6f07d5268b50f4f93d82df2c561dd54b9b7fc144726601
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSm:+NWPkHlUfBgpuPdWzyuDTifgyWl1
Behavioral task
behavioral1
Sample
d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce
-
Size
576KB
-
MD5
f678e5e1ae32254392d2db37e5753bc5
-
SHA1
b3a22c78e65ed29359a30695e57358c8c5279c8d
-
SHA256
d98899b731d45a8ea7c6aa8f655aba47efcc22b4d9d4c8c1f7adf2b51fe90cce
-
SHA512
5c7ef7dc0f9b059b7c5f08d7a321e198e67427aeb26ba6d9acae82f0ee2a90ba7087df4ae25911316a6f07d5268b50f4f93d82df2c561dd54b9b7fc144726601
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSm:+NWPkHlUfBgpuPdWzyuDTifgyWl1
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-