General
-
Target
gktpohoadkth.exe
-
Size
429KB
-
Sample
241227-tnxghsxker
-
MD5
1508a5d67bf9beb497b97cc5eff91c5e
-
SHA1
69c93e632d29fda0f093eacdadd434066f307343
-
SHA256
ca88a597ed2127de7a2cb2f5b3e82d61035e9e2d5714ec5c0ae1659ef1c13df7
-
SHA512
3e36d4dd681e1950fdac02f48d9e07b1419b5240b007e9595bba6a5ac1c6f3171db495359e7794b40bcd697c50ab4ebd4010a7c95317859ef6ec11d7ce34b06e
-
SSDEEP
12288:C+6Bg1Wu+6LQxbcjTqCyeC2PMI7uB7RTx:CH6L/IGMOuV
Behavioral task
behavioral1
Sample
gktpohoadkth.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
gktpohoadkth.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
systembc
wodresomdaymomentum.org
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Targets
-
-
Target
gktpohoadkth.exe
-
Size
429KB
-
MD5
1508a5d67bf9beb497b97cc5eff91c5e
-
SHA1
69c93e632d29fda0f093eacdadd434066f307343
-
SHA256
ca88a597ed2127de7a2cb2f5b3e82d61035e9e2d5714ec5c0ae1659ef1c13df7
-
SHA512
3e36d4dd681e1950fdac02f48d9e07b1419b5240b007e9595bba6a5ac1c6f3171db495359e7794b40bcd697c50ab4ebd4010a7c95317859ef6ec11d7ce34b06e
-
SSDEEP
12288:C+6Bg1Wu+6LQxbcjTqCyeC2PMI7uB7RTx:CH6L/IGMOuV
Score10/10-
Amadey family
-
Systembc family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-