General
-
Target
ring.exe
-
Size
16.7MB
-
Sample
241119-yandxawkdj
-
MD5
dec85de31c5a9e3754ab0fcfed8a3e79
-
SHA1
b47c8f4918518f1538842b5b12bc5dcbea5c3d59
-
SHA256
fa4f6da9ea8aca025d129328ce57b36343a1bc8796d1846d02157d2242f904a8
-
SHA512
34831ff6c2571f0354bd5958a036a0030c85cab0c6dcb47c881cb366a47adf20741d6a473be369c20a1535fde380f0be6bc53c5edb96d4729a92d4bbf47bf0aa
-
SSDEEP
49152:3h+ZMbgw1VoIj5CSYS9o9IpHiYXcaXoMx+q2zAkcq085zXnCC7CWRUFGwhnb1b:3h+ZYD5DXc6oMx7CAkL0iz3T8T1b
Static task
static1
Behavioral task
behavioral1
Sample
ring.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ring.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ring.exe
-
Size
16.7MB
-
MD5
dec85de31c5a9e3754ab0fcfed8a3e79
-
SHA1
b47c8f4918518f1538842b5b12bc5dcbea5c3d59
-
SHA256
fa4f6da9ea8aca025d129328ce57b36343a1bc8796d1846d02157d2242f904a8
-
SHA512
34831ff6c2571f0354bd5958a036a0030c85cab0c6dcb47c881cb366a47adf20741d6a473be369c20a1535fde380f0be6bc53c5edb96d4729a92d4bbf47bf0aa
-
SSDEEP
49152:3h+ZMbgw1VoIj5CSYS9o9IpHiYXcaXoMx+q2zAkcq085zXnCC7CWRUFGwhnb1b:3h+ZYD5DXc6oMx7CAkL0iz3T8T1b
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-