General
-
Target
sample
-
Size
8KB
-
Sample
241213-yp8cmaxqh1
-
MD5
be3ab1d1fc19b664b3de254beb3086ef
-
SHA1
e944fdcb2d62e379c71624fa6e2815afd3cf7fba
-
SHA256
d94750830fcd3dadb1d2343135f5136042d63451712272a2d7c496d50940efaa
-
SHA512
bb9ba4db70d7315c21ee1497178418f0a6cd3a27f406595621f0fee4643168c9dd806d5dc01178004cd498224e093778d17faea78be1f890e8580b1d23c5c3e4
-
SSDEEP
192:PN2x2BpZge0zxfu/phJmw1fx+G4xrECBk1GVDSkXybwN:Axi0zxfaJpVlARGhwN
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
sample
-
Size
8KB
-
MD5
be3ab1d1fc19b664b3de254beb3086ef
-
SHA1
e944fdcb2d62e379c71624fa6e2815afd3cf7fba
-
SHA256
d94750830fcd3dadb1d2343135f5136042d63451712272a2d7c496d50940efaa
-
SHA512
bb9ba4db70d7315c21ee1497178418f0a6cd3a27f406595621f0fee4643168c9dd806d5dc01178004cd498224e093778d17faea78be1f890e8580b1d23c5c3e4
-
SSDEEP
192:PN2x2BpZge0zxfu/phJmw1fx+G4xrECBk1GVDSkXybwN:Axi0zxfaJpVlARGhwN
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-