General
-
Target
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N
-
Size
88KB
-
Sample
241109-na81hatcjh
-
MD5
8b97b5ed374d6e68451e6742133c3630
-
SHA1
061b5daf8569180fb017b3df17ef7a9ba17e983d
-
SHA256
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86
-
SHA512
3d5639a3459fcd1f33c4119b93bc15b875bae023da7933f5d3e964aac1c2bde4a2374faa35f0080bfaa7135c4840deab0877ba4b17d5437b4be32bdfe81bc799
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEn:6D0ctAVA/bmxIMnoKjyR/Nn
Static task
static1
Behavioral task
behavioral1
Sample
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N
-
Size
88KB
-
MD5
8b97b5ed374d6e68451e6742133c3630
-
SHA1
061b5daf8569180fb017b3df17ef7a9ba17e983d
-
SHA256
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86
-
SHA512
3d5639a3459fcd1f33c4119b93bc15b875bae023da7933f5d3e964aac1c2bde4a2374faa35f0080bfaa7135c4840deab0877ba4b17d5437b4be32bdfe81bc799
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEn:6D0ctAVA/bmxIMnoKjyR/Nn
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-