General
-
Target
0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98
-
Size
735KB
-
Sample
241121-nlz7qs1emg
-
MD5
5b76c7ea91e9c510ef26b05ee777b0af
-
SHA1
633cc7d4c77a932de541a00f19136cd199935edc
-
SHA256
0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98
-
SHA512
b7cad74fbcaa80d07d2ff2bf33f835166ad0cbfa8ed6e71862196b633aabe26129fd066321bd57ee98396d13d05df5b450e493ee77c99be1659312f16145344c
-
SSDEEP
12288:ZsaDPw1Qk89TmyyuR0UoNSoHBiWUE+z/FBUYAIxqiWp7VA0GAIbOdF:ZtLw9gTFb0soHBzd2CY3xqzL/
Static task
static1
Behavioral task
behavioral1
Sample
0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98
-
Size
735KB
-
MD5
5b76c7ea91e9c510ef26b05ee777b0af
-
SHA1
633cc7d4c77a932de541a00f19136cd199935edc
-
SHA256
0751a8aa6a5a7b05bca94d02f3b5d7907455db416f6d7caa2e79a55f51033f98
-
SHA512
b7cad74fbcaa80d07d2ff2bf33f835166ad0cbfa8ed6e71862196b633aabe26129fd066321bd57ee98396d13d05df5b450e493ee77c99be1659312f16145344c
-
SSDEEP
12288:ZsaDPw1Qk89TmyyuR0UoNSoHBiWUE+z/FBUYAIxqiWp7VA0GAIbOdF:ZtLw9gTFb0soHBzd2CY3xqzL/
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-