General
-
Target
240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacdN
-
Size
317KB
-
Sample
241102-n9g13atdra
-
MD5
415b52543a92106f55796f445f880750
-
SHA1
0ebd987235e5a22f132908895b1a858a4586b18b
-
SHA256
240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacd
-
SHA512
253d7ae1d158fe351da72694d182ab346c35a2923a0aa4fedd8da2a475dd741b8e31eb12cdc89074591283db3b3d11e1a36b8f35429187bdfac2e99782bda817
-
SSDEEP
3072:vSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:vPA6wxmuJspr2lb6
Behavioral task
behavioral1
Sample
240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacdN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacdN
-
Size
317KB
-
MD5
415b52543a92106f55796f445f880750
-
SHA1
0ebd987235e5a22f132908895b1a858a4586b18b
-
SHA256
240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacd
-
SHA512
253d7ae1d158fe351da72694d182ab346c35a2923a0aa4fedd8da2a475dd741b8e31eb12cdc89074591283db3b3d11e1a36b8f35429187bdfac2e99782bda817
-
SSDEEP
3072:vSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:vPA6wxmuJspr2lb6
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-