General
-
Target
d2d41d6c0c20e622b4db2ca1672c8b5c653864dd09cb533156616b004c2a2f5fN.exe
-
Size
392KB
-
Sample
241205-esxwhsyjhw
-
MD5
f0787d37ae931fcf19fdbb544b7d5e30
-
SHA1
54d72c908b0e9ba0e4da552d5518bc990e6e2365
-
SHA256
d2d41d6c0c20e622b4db2ca1672c8b5c653864dd09cb533156616b004c2a2f5f
-
SHA512
8a12b1fe0c9d87d3b0317731a810e268c6c09620f8f5e0d9b541fad2810490a47d82183b0c2991f231e274d791ca9a3da3c5d49e74ab473b6a2fea6c5792dbeb
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2/:DPA6wxmuJspr2lb62
Behavioral task
behavioral1
Sample
d2d41d6c0c20e622b4db2ca1672c8b5c653864dd09cb533156616b004c2a2f5fN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d2d41d6c0c20e622b4db2ca1672c8b5c653864dd09cb533156616b004c2a2f5fN.exe
-
Size
392KB
-
MD5
f0787d37ae931fcf19fdbb544b7d5e30
-
SHA1
54d72c908b0e9ba0e4da552d5518bc990e6e2365
-
SHA256
d2d41d6c0c20e622b4db2ca1672c8b5c653864dd09cb533156616b004c2a2f5f
-
SHA512
8a12b1fe0c9d87d3b0317731a810e268c6c09620f8f5e0d9b541fad2810490a47d82183b0c2991f231e274d791ca9a3da3c5d49e74ab473b6a2fea6c5792dbeb
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2/:DPA6wxmuJspr2lb62
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-