General
-
Target
0cf7eda61bb962e320470af8441123db0253eb6e2f47302983044ec035b1891b
-
Size
592KB
-
Sample
241019-w5175s1cqh
-
MD5
4c07b73b8f0a036675ea254cb9fe3417
-
SHA1
838522dc8f95c2ee78bc9bc786c6d1c6cc8e3f03
-
SHA256
0cf7eda61bb962e320470af8441123db0253eb6e2f47302983044ec035b1891b
-
SHA512
bd9308617edbe69fbd5ef67e39dbd248ce9af6a1264ab544394f44b7aac975fa3b14a5d780a2d06d682f35bb01a429f5a70fa70b390169343831d2b40a4ee573
-
SSDEEP
12288:wcWRJxhIUKofd9S88itJsL6s8GwUF81yn0FI/6IC0XoSv:TW/xhIUKofSytJsL6HUP0OHCU
Behavioral task
behavioral1
Sample
0cf7eda61bb962e320470af8441123db0253eb6e2f47302983044ec035b1891b.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0cf7eda61bb962e320470af8441123db0253eb6e2f47302983044ec035b1891b
-
Size
592KB
-
MD5
4c07b73b8f0a036675ea254cb9fe3417
-
SHA1
838522dc8f95c2ee78bc9bc786c6d1c6cc8e3f03
-
SHA256
0cf7eda61bb962e320470af8441123db0253eb6e2f47302983044ec035b1891b
-
SHA512
bd9308617edbe69fbd5ef67e39dbd248ce9af6a1264ab544394f44b7aac975fa3b14a5d780a2d06d682f35bb01a429f5a70fa70b390169343831d2b40a4ee573
-
SSDEEP
12288:wcWRJxhIUKofd9S88itJsL6s8GwUF81yn0FI/6IC0XoSv:TW/xhIUKofSytJsL6HUP0OHCU
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-