General
-
Target
d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4dN.exe
-
Size
88KB
-
Sample
241125-z6wwlawrgz
-
MD5
1cc35d718c37a05e58e2362d7b08e750
-
SHA1
a15b3a0d374b3940fc0caeb0b3471db1f8bfbb02
-
SHA256
d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4d
-
SHA512
1eea14d12d994f442cbe47f767ddbc78684e22f687894c0d210a969bf80f952e31362ba9190b50278f4ba14862cc215941ddd0c97ee5fa2649ed9b45ca427705
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEh:6D0ctAVA/bmxIMnoKjyR/Nh
Static task
static1
Behavioral task
behavioral1
Sample
d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4dN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4dN.exe
-
Size
88KB
-
MD5
1cc35d718c37a05e58e2362d7b08e750
-
SHA1
a15b3a0d374b3940fc0caeb0b3471db1f8bfbb02
-
SHA256
d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4d
-
SHA512
1eea14d12d994f442cbe47f767ddbc78684e22f687894c0d210a969bf80f952e31362ba9190b50278f4ba14862cc215941ddd0c97ee5fa2649ed9b45ca427705
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEh:6D0ctAVA/bmxIMnoKjyR/Nh
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-