General
-
Target
8ca425ec8926d10108f63f2524942b969ac5ec25eeaa792d2a8f9e7d74b959a3
-
Size
2KB
-
Sample
241119-xkr96szere
-
MD5
abf8d214073a5f6bff220d3b88d56fc7
-
SHA1
f058d68fc882e192439ad64d9f772fe4d220235d
-
SHA256
8ca425ec8926d10108f63f2524942b969ac5ec25eeaa792d2a8f9e7d74b959a3
-
SHA512
0467ee97857b2da32f052b58d0f5518a35100b0dfe04d8eebbda154c0a3337633cc86a0d4659cccfbca44dd2fcac316d35db78a7076a7127eef5602f37faa7f6
Static task
static1
Behavioral task
behavioral1
Sample
8ca425ec8926d10108f63f2524942b969ac5ec25eeaa792d2a8f9e7d74b959a3.lnk
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
8ca425ec8926d10108f63f2524942b969ac5ec25eeaa792d2a8f9e7d74b959a3
-
Size
2KB
-
MD5
abf8d214073a5f6bff220d3b88d56fc7
-
SHA1
f058d68fc882e192439ad64d9f772fe4d220235d
-
SHA256
8ca425ec8926d10108f63f2524942b969ac5ec25eeaa792d2a8f9e7d74b959a3
-
SHA512
0467ee97857b2da32f052b58d0f5518a35100b0dfe04d8eebbda154c0a3337633cc86a0d4659cccfbca44dd2fcac316d35db78a7076a7127eef5602f37faa7f6
-
Blocklisted process makes network request
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-