General
-
Target
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.zip
-
Size
91KB
-
Sample
250114-m6v8vawpdw
-
MD5
e34225705c5d6c48849f2aedecfcae61
-
SHA1
258634ab1e5a5ede357324a762200a1ad0be69e4
-
SHA256
9c74e1c18c2f7056010933362bc035923469d71016c8babbaaa5d2eae626836f
-
SHA512
9e1badaf8e58b8c6b046658be91f2783d0bea6f144e0cb0496af932999287794ad9834673a178ad3b694d0782161bfb36139d0f34a8f6a41c57a5397a3588ceb
-
SSDEEP
1536:BHkY1AOTBOVz5FOl/KnGjE4mCqzVFZjee4TMiNpn7l+O2iXJ9jBX7aGbXh8J:BHz6gBOhPeSfjefVr7l+hU7Fh8J
Behavioral task
behavioral1
Sample
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.exe
-
Size
392KB
-
MD5
9e9818f5a14d0ff1b45d75493930695f
-
SHA1
f7a7f1d59adb83febc9a75e6ba68003946025923
-
SHA256
57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62
-
SHA512
cbb07fb22c629fa30f79f7fdccb316df78b244d4d36f346a03ebfd90862e3338b79fbf4d2c9eeeb512eb5ab12d54a88a5578d16c7719e8ad9c1c3c5fe4b45dd5
-
SSDEEP
3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-