General
-
Target
w.zip
-
Size
443KB
-
Sample
241203-n23msszkcn
-
MD5
7abde2d9d772212f690e1657e66e4863
-
SHA1
ce9629c02dbd6953ff5ab9ebc910409a4ebc488b
-
SHA256
b32cfa2c536bfc631f37621471e23d3b05dffa1c94ef1c88e8136fd07c389105
-
SHA512
9f6e4bae303120161c98063a0049504dc09f74690ce81c65c8afbc5dfc3788b4058cac0527cda449707e2a79aeb9db695f27e6269bc23442c3b1455d87d51ffe
-
SSDEEP
12288:ShJL3yGgLoSdDilX+F2ramKbYgMLj7llsLQn:kUGg8Uil/ramJhNn
Behavioral task
behavioral1
Sample
w.zip
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
w.zip
-
Size
443KB
-
MD5
7abde2d9d772212f690e1657e66e4863
-
SHA1
ce9629c02dbd6953ff5ab9ebc910409a4ebc488b
-
SHA256
b32cfa2c536bfc631f37621471e23d3b05dffa1c94ef1c88e8136fd07c389105
-
SHA512
9f6e4bae303120161c98063a0049504dc09f74690ce81c65c8afbc5dfc3788b4058cac0527cda449707e2a79aeb9db695f27e6269bc23442c3b1455d87d51ffe
-
SSDEEP
12288:ShJL3yGgLoSdDilX+F2ramKbYgMLj7llsLQn:kUGg8Uil/ramJhNn
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1