General
-
Target
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe
-
Size
88KB
-
Sample
241117-h4qhcsymbl
-
MD5
6f94eafd8cb8c157a4af2931f2d05e20
-
SHA1
6a69397e5058f3c8fd84b4be939a982e7484b0f4
-
SHA256
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18be
-
SHA512
8e25058ba92fed72916364a116510a10b2b3871384fe3a1c2c26485ec35d153151f4f951dbc3fe8d633b4470e6ec003869e3748fbd5a358ecd25b5398f49420f
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEu:6D0ctAVA/bmxIMnoKjyR/Nu
Static task
static1
Behavioral task
behavioral1
Sample
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe
-
Size
88KB
-
MD5
6f94eafd8cb8c157a4af2931f2d05e20
-
SHA1
6a69397e5058f3c8fd84b4be939a982e7484b0f4
-
SHA256
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18be
-
SHA512
8e25058ba92fed72916364a116510a10b2b3871384fe3a1c2c26485ec35d153151f4f951dbc3fe8d633b4470e6ec003869e3748fbd5a358ecd25b5398f49420f
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEu:6D0ctAVA/bmxIMnoKjyR/Nu
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-