General
-
Target
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475
-
Size
284KB
-
Sample
241022-1qf1wayamp
-
MD5
75595a4ebc9137daa39e031400b31248
-
SHA1
dd824c02974544ac33a1b704baa822425c53cd09
-
SHA256
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475
-
SHA512
e8eaf97bb4d1cc4c6f3cab9a7b008c44bf9f0ee55e0f80ccef59e7d253ce5402a77c3b5b26b498f74edd3f81569922610773f4ad6064aaed3cbb71351a6804d2
-
SSDEEP
3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l
Static task
static1
Behavioral task
behavioral1
Sample
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475
-
Size
284KB
-
MD5
75595a4ebc9137daa39e031400b31248
-
SHA1
dd824c02974544ac33a1b704baa822425c53cd09
-
SHA256
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475
-
SHA512
e8eaf97bb4d1cc4c6f3cab9a7b008c44bf9f0ee55e0f80ccef59e7d253ce5402a77c3b5b26b498f74edd3f81569922610773f4ad6064aaed3cbb71351a6804d2
-
SSDEEP
3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-