General
-
Target
a505236f48ec6248e0ad539e9359ad2f1c739120dfc77f3adcc510dd942cd671
-
Size
4KB
-
Sample
250228-m45phazjy7
-
MD5
f85f110b13c0bb7d68af2fcad372f43a
-
SHA1
e091b2f86925fa0bf079b747b0ebb281eb40e896
-
SHA256
a505236f48ec6248e0ad539e9359ad2f1c739120dfc77f3adcc510dd942cd671
-
SHA512
2b1332179bb57a569fccd94ba63a795c540400b402962fdb136a733e01e02bcde72f4bc9f5030f383187cb66b7dc18c0106644181bc5bbcb9c06b8732d20c03d
-
SSDEEP
96:g8Jmsd5QyB/jFnnJkvpXEScMWjPDLHYGCW:Vmkhn0fcXj3Hnd
Static task
static1
Behavioral task
behavioral1
Sample
purchase list #8479734734-8843947347_____________________________.vbe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
purchase list #8479734734-8843947347_____________________________.vbe
-
Size
24KB
-
MD5
5aea1615d1872e876da66200bc9e47fa
-
SHA1
6fe3576517885705735762ff060e9068fd9fdbe9
-
SHA256
c9a42d3cb9f1ff79d28112275dd9d598daa429c81912c171401fce5594f1f515
-
SHA512
68a87c1bbbf107714634af224b46a02252c8fd7e3799dee8fa36e4e064be07f2e51e4fab20591d7e6e05de769a4aac7ae59ef3b70e95cd3b6cec77d028a05ccd
-
SSDEEP
192:Lh1qAagTqDNmlc1sN+uc4f9caUxarPlP1K:qMqDAlnoP4VcaUxarK
-
Darkcloud family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-