General
-
Target
daf70603ff726355588c343a99a479ad7d4ac4ebfb77102e5dd3864cbe8d977cN
-
Size
284KB
-
Sample
241022-ha4swssblc
-
MD5
427b68425698b782d0698e931cb23f80
-
SHA1
8b0f9015101d80cf100b7fee8bd45147aef96fce
-
SHA256
daf70603ff726355588c343a99a479ad7d4ac4ebfb77102e5dd3864cbe8d977c
-
SHA512
035d5169c8e3c8121314dc27f27aa24b33d00167c3f8c539f78c6cba2beabbab33907e3401410a39f67451eaf1ede34a7eb02ee6b11ffefd1965086d3bdfe672
-
SSDEEP
3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l
Static task
static1
Behavioral task
behavioral1
Sample
daf70603ff726355588c343a99a479ad7d4ac4ebfb77102e5dd3864cbe8d977cN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
daf70603ff726355588c343a99a479ad7d4ac4ebfb77102e5dd3864cbe8d977cN
-
Size
284KB
-
MD5
427b68425698b782d0698e931cb23f80
-
SHA1
8b0f9015101d80cf100b7fee8bd45147aef96fce
-
SHA256
daf70603ff726355588c343a99a479ad7d4ac4ebfb77102e5dd3864cbe8d977c
-
SHA512
035d5169c8e3c8121314dc27f27aa24b33d00167c3f8c539f78c6cba2beabbab33907e3401410a39f67451eaf1ede34a7eb02ee6b11ffefd1965086d3bdfe672
-
SSDEEP
3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-