General
-
Target
caed2126f91d901693abfe444a86ad5af883f54e9caae3607e6ae1c51ebeaa45N
-
Size
3.8MB
-
Sample
241021-qhlahsxalq
-
MD5
d868ec054b1b49df794c3049aea31e40
-
SHA1
dedd576c8ea718a29cb720d601b433a66c757aa9
-
SHA256
caed2126f91d901693abfe444a86ad5af883f54e9caae3607e6ae1c51ebeaa45
-
SHA512
b1b8d1e8d0cd9186e175a994ca34ac1aab574cf8128d8293eedbd2cc1099b317c7152d48bfc2afde06be1cde4ee2a1701f10931496dc4d52f5fc2a3e8995da51
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qc:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSim
Behavioral task
behavioral1
Sample
caed2126f91d901693abfe444a86ad5af883f54e9caae3607e6ae1c51ebeaa45N.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
caed2126f91d901693abfe444a86ad5af883f54e9caae3607e6ae1c51ebeaa45N
-
Size
3.8MB
-
MD5
d868ec054b1b49df794c3049aea31e40
-
SHA1
dedd576c8ea718a29cb720d601b433a66c757aa9
-
SHA256
caed2126f91d901693abfe444a86ad5af883f54e9caae3607e6ae1c51ebeaa45
-
SHA512
b1b8d1e8d0cd9186e175a994ca34ac1aab574cf8128d8293eedbd2cc1099b317c7152d48bfc2afde06be1cde4ee2a1701f10931496dc4d52f5fc2a3e8995da51
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qc:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSim
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-