General
-
Target
img100 (8).png
-
Size
1.4MB
-
Sample
241110-tk5cyszkey
-
MD5
f1ad1ff08db4b54537c40d9ea369a4b4
-
SHA1
e0a87b82a6a080e8fa78d22cd5b8a2fa2d2dd241
-
SHA256
b98f423ef45672dfd08e36f1ed2279b8a4a7c797a34a3349507bf6e68a95eb8c
-
SHA512
558e8b18efc83846944180e8eba397784aaa37bef20744277fa521b99ddeaea9c15003dd8cc494d7f3737135f9b7b59c4634ff0d19fc3dae89e0aa17658d61f8
-
SSDEEP
24576:/12hYitTBAc+64EvTBJg47tO9QU1poyGneUlAGG+pxtvR4WH/DqOtum1IhZ:/1YYitTBAcXh1Jg+tOWupFUlAV0dqOtC
Static task
static1
Behavioral task
behavioral1
Sample
img100 (8).png
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
img100 (8).png
-
Size
1.4MB
-
MD5
f1ad1ff08db4b54537c40d9ea369a4b4
-
SHA1
e0a87b82a6a080e8fa78d22cd5b8a2fa2d2dd241
-
SHA256
b98f423ef45672dfd08e36f1ed2279b8a4a7c797a34a3349507bf6e68a95eb8c
-
SHA512
558e8b18efc83846944180e8eba397784aaa37bef20744277fa521b99ddeaea9c15003dd8cc494d7f3737135f9b7b59c4634ff0d19fc3dae89e0aa17658d61f8
-
SSDEEP
24576:/12hYitTBAc+64EvTBJg47tO9QU1poyGneUlAGG+pxtvR4WH/DqOtum1IhZ:/1YYitTBAcXh1Jg+tOWupFUlAV0dqOtC
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-