General
-
Target
cc97cd2834a545c6f4e89aea88a758f9fd880586f55d21dda5c8dd2017ed689b
-
Size
754KB
-
Sample
241121-p8x7bsslhy
-
MD5
9b8a71b09ca89696e15256d79a7b5d09
-
SHA1
dfaaf3c9526984ba92ce288e2e39914f4eb059aa
-
SHA256
cc97cd2834a545c6f4e89aea88a758f9fd880586f55d21dda5c8dd2017ed689b
-
SHA512
8d62077dd90f39bee4cb263604963e29967f558a49a1255153279352cb5ec3f66d0450f3f9f6dc48f530fb0f79a49e727a3d11e7d781acb8798f2b79072ba32b
-
SSDEEP
12288:x51Din4v33ye0Ub5CeyiN/+d33jPQVLj4/c9tKiVJj36HG2cK1APfcDOLru:xXiC3ydUkxt0acb9KHG2cbW
Static task
static1
Behavioral task
behavioral1
Sample
cc97cd2834a545c6f4e89aea88a758f9fd880586f55d21dda5c8dd2017ed689b.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
cc97cd2834a545c6f4e89aea88a758f9fd880586f55d21dda5c8dd2017ed689b
-
Size
754KB
-
MD5
9b8a71b09ca89696e15256d79a7b5d09
-
SHA1
dfaaf3c9526984ba92ce288e2e39914f4eb059aa
-
SHA256
cc97cd2834a545c6f4e89aea88a758f9fd880586f55d21dda5c8dd2017ed689b
-
SHA512
8d62077dd90f39bee4cb263604963e29967f558a49a1255153279352cb5ec3f66d0450f3f9f6dc48f530fb0f79a49e727a3d11e7d781acb8798f2b79072ba32b
-
SSDEEP
12288:x51Din4v33ye0Ub5CeyiN/+d33jPQVLj4/c9tKiVJj36HG2cK1APfcDOLru:xXiC3ydUkxt0acb9KHG2cbW
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-