General
-
Target
c55eab0f02991f64fb27dfee83b19872effeb539b83bfc439e44d35b70298489
-
Size
576KB
-
Sample
241021-dgpkbsvdqh
-
MD5
2093a76fc4560b1e6230ae399202a7b8
-
SHA1
7dc040ffd5d7f8412b37e23b79c6942a28d10747
-
SHA256
c55eab0f02991f64fb27dfee83b19872effeb539b83bfc439e44d35b70298489
-
SHA512
bb9ff9b5d9022a64f24fc79f6c26f57f3ab1bca8e2416fe3315df74787a5d762043eb3943d62541f135c7f79ae939f4363642ac49d95f32e6d84218735c90735
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWlX
Behavioral task
behavioral1
Sample
c55eab0f02991f64fb27dfee83b19872effeb539b83bfc439e44d35b70298489.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c55eab0f02991f64fb27dfee83b19872effeb539b83bfc439e44d35b70298489
-
Size
576KB
-
MD5
2093a76fc4560b1e6230ae399202a7b8
-
SHA1
7dc040ffd5d7f8412b37e23b79c6942a28d10747
-
SHA256
c55eab0f02991f64fb27dfee83b19872effeb539b83bfc439e44d35b70298489
-
SHA512
bb9ff9b5d9022a64f24fc79f6c26f57f3ab1bca8e2416fe3315df74787a5d762043eb3943d62541f135c7f79ae939f4363642ac49d95f32e6d84218735c90735
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSO:+NWPkHlUfBgpuPdWzyuDTifgyWlX
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-