General
-
Target
0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08N
-
Size
559KB
-
Sample
241022-q5w1jazfkr
-
MD5
c9b7bd63799bcddc7f30a98c7d246d70
-
SHA1
c39f771467dbc17b41e7e1f20d3afbe39ec8fa6f
-
SHA256
0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08
-
SHA512
fb16da4de24a6f0fd84d8cdf8022c16b05c3504336225ba92a8642fd5184f9e8c858c5f90a3d75e6e3c2f936f1a8416d806b2b7c5ae4855dd03bd6c43d309f4d
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS9:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlH
Behavioral task
behavioral1
Sample
0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08N.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08N
-
Size
559KB
-
MD5
c9b7bd63799bcddc7f30a98c7d246d70
-
SHA1
c39f771467dbc17b41e7e1f20d3afbe39ec8fa6f
-
SHA256
0facee7530774ecba0c148770acce7d742c1cb9568a0b390470dae1bf72bcc08
-
SHA512
fb16da4de24a6f0fd84d8cdf8022c16b05c3504336225ba92a8642fd5184f9e8c858c5f90a3d75e6e3c2f936f1a8416d806b2b7c5ae4855dd03bd6c43d309f4d
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS9:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlH
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-