General
-
Target
SecuriteInfo.com.Win32.Agent-BDOJ.1516.18040.exe
-
Size
7.9MB
-
Sample
241027-v84a8sxpbl
-
MD5
3c1b1f453e5f9f0d71f7862d2d6235fe
-
SHA1
2092b1b88e17b165ea635b136aceecb05c54e042
-
SHA256
984156f2a09823ce55d34fab0738e81d086b4599dbba3b1f6282aa3cce64524a
-
SHA512
effef144d925e8aeb8e499331b339a7341709b2e443dd29df0dd36a59d9f9e1321d7e14089f7cd0f3eecf86f225e755d12a23eb74d75cdfda508a67ce7a56431
-
SSDEEP
196608:5QHY8OewfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jF:7VIHziK1piXLGVE4Ue0VJB
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Agent-BDOJ.1516.18040.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Win32.Agent-BDOJ.1516.18040.exe
-
Size
7.9MB
-
MD5
3c1b1f453e5f9f0d71f7862d2d6235fe
-
SHA1
2092b1b88e17b165ea635b136aceecb05c54e042
-
SHA256
984156f2a09823ce55d34fab0738e81d086b4599dbba3b1f6282aa3cce64524a
-
SHA512
effef144d925e8aeb8e499331b339a7341709b2e443dd29df0dd36a59d9f9e1321d7e14089f7cd0f3eecf86f225e755d12a23eb74d75cdfda508a67ce7a56431
-
SSDEEP
196608:5QHY8OewfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jF:7VIHziK1piXLGVE4Ue0VJB
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-