General
-
Target
ec4db2615ebd67b687a66376bdb2e463879615df1b28244b6988512a5f5bb2beN
-
Size
284KB
-
Sample
241030-pflylavkar
-
MD5
2950069e06087f9cb361bae5796a2be0
-
SHA1
f4c66734e30a640d28446c8c14918eef203a785c
-
SHA256
ec4db2615ebd67b687a66376bdb2e463879615df1b28244b6988512a5f5bb2be
-
SHA512
8bbf6ec202dae7d8cb7e4f30545d8c38a96ee2f8d47ddd85f50bc9d45bbfed6c7ed27ccf545cf85efc6982f25f8707f497da55d0c7bc19a7931646b5b6dcf07e
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC9:mPA6wxmuJspr2la
Static task
static1
Behavioral task
behavioral1
Sample
ec4db2615ebd67b687a66376bdb2e463879615df1b28244b6988512a5f5bb2beN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ec4db2615ebd67b687a66376bdb2e463879615df1b28244b6988512a5f5bb2beN
-
Size
284KB
-
MD5
2950069e06087f9cb361bae5796a2be0
-
SHA1
f4c66734e30a640d28446c8c14918eef203a785c
-
SHA256
ec4db2615ebd67b687a66376bdb2e463879615df1b28244b6988512a5f5bb2be
-
SHA512
8bbf6ec202dae7d8cb7e4f30545d8c38a96ee2f8d47ddd85f50bc9d45bbfed6c7ed27ccf545cf85efc6982f25f8707f497da55d0c7bc19a7931646b5b6dcf07e
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC9:mPA6wxmuJspr2la
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-