General
-
Target
d904abdadf92271270101152ae5c12f1ed441d61df744d0ec12e2a0c49e8717e
-
Size
88KB
-
Sample
241203-dftgwswqbs
-
MD5
9f0b77ab81f4a441cd987e69c9207fc7
-
SHA1
07abb158f7aead70da782b18791c2f76975ec569
-
SHA256
d904abdadf92271270101152ae5c12f1ed441d61df744d0ec12e2a0c49e8717e
-
SHA512
4fefb11ec790b016f9f100da3d06f93e830225345e1ade1a034b51ba999ff46fd3a85b818c8f3fca651fff58813742389797e167e9314a50b6591834b4a3cd9f
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEg:6D0ctAVA/bmxIMnoKjyR/Ng
Static task
static1
Behavioral task
behavioral1
Sample
d904abdadf92271270101152ae5c12f1ed441d61df744d0ec12e2a0c49e8717e.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d904abdadf92271270101152ae5c12f1ed441d61df744d0ec12e2a0c49e8717e
-
Size
88KB
-
MD5
9f0b77ab81f4a441cd987e69c9207fc7
-
SHA1
07abb158f7aead70da782b18791c2f76975ec569
-
SHA256
d904abdadf92271270101152ae5c12f1ed441d61df744d0ec12e2a0c49e8717e
-
SHA512
4fefb11ec790b016f9f100da3d06f93e830225345e1ade1a034b51ba999ff46fd3a85b818c8f3fca651fff58813742389797e167e9314a50b6591834b4a3cd9f
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEg:6D0ctAVA/bmxIMnoKjyR/Ng
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-