General
-
Target
eed111a1ee7190d2be358a867c59188b2be98cd074e4f7a3b6832a3854ecb6e6.exe
-
Size
392KB
-
Sample
250113-l6nckazrgq
-
MD5
62a9d7c5d20e3f9e8921fdd8c1e0222f
-
SHA1
9dc5462a4716656fcb308127f457b1a2b249ec8f
-
SHA256
eed111a1ee7190d2be358a867c59188b2be98cd074e4f7a3b6832a3854ecb6e6
-
SHA512
6e688319bafebf6f1c4ae0ed0aeb604f43f97167ee11fdcd0234e7be7f60d5e027fafa675417c6c1fa587f2590dc72eec2bef6dde22841b55297165dd63ffec0
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2f:DPA6wxmuJspr2lb6W
Behavioral task
behavioral1
Sample
eed111a1ee7190d2be358a867c59188b2be98cd074e4f7a3b6832a3854ecb6e6.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
eed111a1ee7190d2be358a867c59188b2be98cd074e4f7a3b6832a3854ecb6e6.exe
-
Size
392KB
-
MD5
62a9d7c5d20e3f9e8921fdd8c1e0222f
-
SHA1
9dc5462a4716656fcb308127f457b1a2b249ec8f
-
SHA256
eed111a1ee7190d2be358a867c59188b2be98cd074e4f7a3b6832a3854ecb6e6
-
SHA512
6e688319bafebf6f1c4ae0ed0aeb604f43f97167ee11fdcd0234e7be7f60d5e027fafa675417c6c1fa587f2590dc72eec2bef6dde22841b55297165dd63ffec0
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2f:DPA6wxmuJspr2lb6W
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-