General
-
Target
ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb
-
Size
392KB
-
Sample
241107-d8frhavdjh
-
MD5
bc7581c0bab4d516c84d22d10b886356
-
SHA1
e2f733481cde3cb604b6cb6fa53d887c90f3a7f2
-
SHA256
ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb
-
SHA512
33b6a227c56989052483446c2cbc1c5ec68b604b2c7097d711493aeaf6fce64dee8f2aceef99a472b9d242aaafc62fb133485d45af97cdc935ba3abf4436e1fe
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6
Behavioral task
behavioral1
Sample
ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb
-
Size
392KB
-
MD5
bc7581c0bab4d516c84d22d10b886356
-
SHA1
e2f733481cde3cb604b6cb6fa53d887c90f3a7f2
-
SHA256
ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb
-
SHA512
33b6a227c56989052483446c2cbc1c5ec68b604b2c7097d711493aeaf6fce64dee8f2aceef99a472b9d242aaafc62fb133485d45af97cdc935ba3abf4436e1fe
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-