Overview
overview
10Static
static
3Bolt-Check....5.zip
windows10-2004-x64
1Bolt-Checker.exe
windows10-2004-x64
10config\config.yml
windows10-2004-x64
3drivefsext.exe
windows10-2004-x64
3lib.exe
windows10-2004-x64
7boltchecker.pyc
windows10-2004-x64
3libexec.exe
windows10-2004-x64
3skins_database.txt
windows10-2004-x64
1version.txt
windows10-2004-x64
1Analysis
-
max time kernel
647s -
max time network
655s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 18:12
Behavioral task
behavioral1
Sample
Bolt-Checker-v1.3.5.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral2
Sample
Bolt-Checker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
config\config.yml
Resource
win10v2004-20250129-en
Behavioral task
behavioral4
Sample
drivefsext.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
lib.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
boltchecker.pyc
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
libexec.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral8
Sample
skins_database.txt
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
version.txt
Resource
win10v2004-20250129-en
General
-
Target
drivefsext.exe
-
Size
1.8MB
-
MD5
26f56121184843056f1d6e6db3f9844b
-
SHA1
f8d6c767cab3be5e55608cc5abd30a4c383759e9
-
SHA256
3ad26e1c16b6f49c6136c0c1c02c5943437349a310a6bcc5a8a0f4924a6f4ae4
-
SHA512
13a0898a6780f474ab4ffe8e46ca0227f03f2c4d26daaf4b61862eb7374a65d887b96a8672f21247e7f3aac4c49cce77521dd1564983b52f8716219aff894b9d
-
SSDEEP
24576:2m3hIqxIdAtLA0Q9xtPUf0ZOxGI3ffWgR5vuv54Jdhx76g:2gWaW9xthIXWgR5vuv54Jdhx7n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drivefsext.exe