General
-
Target
29112024_1330_28112024_N° OCX 0001-00012.r09
-
Size
753KB
-
Sample
241129-qr7j4sxqdz
-
MD5
f312ecf105cd01dad17faa7780217d43
-
SHA1
7668360cfc3e687b2f4c0c6c841b85d4dffa6c94
-
SHA256
ed02f151fff2b77e0c19b0b0bbb82b6e2b9c0af727256516a7d937334fbc897f
-
SHA512
8577023b2418476bb54a694515bb9fc96ccd15bf9add3e2ed81e1996b46939fc1905bf186c40aff97a17f1ad370e759ab7a6b5dcad4488639185cb1b378d5303
-
SSDEEP
12288:ke0ViOFF85JHGR9pSZATp8xFu2YRc5Dfhu3Ma1xfHhO+qyoja1GDIIMvwS:kVi885JHaaA1ESapucaL0+qyOaYev
Static task
static1
Behavioral task
behavioral1
Sample
N° OCX 0001-00012.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
N° OCX 0001-00012.exe
-
Size
861KB
-
MD5
27c13d7e18632c238e3c9533c923c8c5
-
SHA1
7dd7dc10bd9f90cdaf514913c515e4def8b5aab4
-
SHA256
7799d3a4d65328993adef4f4c40f90d59c84b8bc9422b12c26fdf44a6cce0e49
-
SHA512
b076ced98c579ecee6439b2a8839694a0c5e587353d1175415fcb257cd335f83731e78f8cbe22f1caa6fce1e4100de4e6e27977466583b02e2d4a3271a859e8e
-
SSDEEP
24576:g0cl1ijQTSwtIgC/bMTaG/B+p+aelhy1zGUxj:gbl8cTSSIgCkPaeliL
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-