General
-
Target
6a459e3bf2af9fe1dc1e2c013170eae30f0378594a1ef54a2a624228f8d2e94eN
-
Size
588KB
-
Sample
241019-hbfsfsscjh
-
MD5
d07c7d941ddf8e178426e7210b3c2180
-
SHA1
0cdcedcfac485f3575306a9800fd637a0b8ac3f1
-
SHA256
6a459e3bf2af9fe1dc1e2c013170eae30f0378594a1ef54a2a624228f8d2e94e
-
SHA512
90f73aec8460de9abd4b7e7236930114a3832e108adb7574dad3e6b424079dd31a97ea8aa6369dc162a80674e6de84ba8998d67ed0b11df897cf03e025db97dd
-
SSDEEP
12288:zcWRJxhIUKofd9S88itJsL6s8GwUF81yn0FI/6IC0XoSF:oW/xhIUKofSytJsL6HUP0OHCA
Behavioral task
behavioral1
Sample
6a459e3bf2af9fe1dc1e2c013170eae30f0378594a1ef54a2a624228f8d2e94eN.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
6a459e3bf2af9fe1dc1e2c013170eae30f0378594a1ef54a2a624228f8d2e94eN
-
Size
588KB
-
MD5
d07c7d941ddf8e178426e7210b3c2180
-
SHA1
0cdcedcfac485f3575306a9800fd637a0b8ac3f1
-
SHA256
6a459e3bf2af9fe1dc1e2c013170eae30f0378594a1ef54a2a624228f8d2e94e
-
SHA512
90f73aec8460de9abd4b7e7236930114a3832e108adb7574dad3e6b424079dd31a97ea8aa6369dc162a80674e6de84ba8998d67ed0b11df897cf03e025db97dd
-
SSDEEP
12288:zcWRJxhIUKofd9S88itJsL6s8GwUF81yn0FI/6IC0XoSF:oW/xhIUKofSytJsL6HUP0OHCA
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-