General
-
Target
WinSCP-6.3.5-Setup.exe
-
Size
11.1MB
-
Sample
241119-1pt64starb
-
MD5
d77322dc956da781905d553e3feb9153
-
SHA1
89db51587ecfb071fe71add71050e2d9e5377539
-
SHA256
49e17ce8b1df637a71dfac483e9fef72f6747e4235cce3871a1bb3f3a1371127
-
SHA512
af2ec6d994f8e4fcf912cfa122136a2262991fccc46b6dc98963f83e1f8170010b3c03076b134e81b4bdb54a1d1353cfa1328afc4c206c97113929e71ef437d4
-
SSDEEP
196608:07YbPaZbS+UseezGoXBWC6KtWrFhxC7a2RfhFMdccHCxJG++ZztkrRJHpMt4eQ:tL+bpUsR/tWrzxCO21occifG+KtcNr
Static task
static1
Behavioral task
behavioral1
Sample
WinSCP-6.3.5-Setup.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
WinSCP-6.3.5-Setup.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
WinSCP-6.3.5-Setup.exe
-
Size
11.1MB
-
MD5
d77322dc956da781905d553e3feb9153
-
SHA1
89db51587ecfb071fe71add71050e2d9e5377539
-
SHA256
49e17ce8b1df637a71dfac483e9fef72f6747e4235cce3871a1bb3f3a1371127
-
SHA512
af2ec6d994f8e4fcf912cfa122136a2262991fccc46b6dc98963f83e1f8170010b3c03076b134e81b4bdb54a1d1353cfa1328afc4c206c97113929e71ef437d4
-
SSDEEP
196608:07YbPaZbS+UseezGoXBWC6KtWrFhxC7a2RfhFMdccHCxJG++ZztkrRJHpMt4eQ:tL+bpUsR/tWrzxCO21occifG+KtcNr
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-