General
-
Target
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d
-
Size
9.6MB
-
Sample
250320-za3n9sx1ft
-
MD5
6e9d2ef6a2146bb9ae5a5cf4d89759bb
-
SHA1
3eff5752741da1c8f786d07021cad8f1237c23e8
-
SHA256
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d
-
SHA512
713362bc1d2b25f4a8ed695f30bd2d340a43df336cbc598d43fafb3f1505c35585ca8ebaa5dadcfb4a0cbab75abc32a33d1ab17b2aee5d1272c60549d5309e18
-
SSDEEP
196608:S3o9iCKRyyrUG5LO875QA++LsjNZuxzqCbcsf3KwUyHXpP9wcoAt7RXGR:ahfLxNa0L8Z2Pgsf3KwUy3JKcjtpGR
Static task
static1
Behavioral task
behavioral1
Sample
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d
-
Size
9.6MB
-
MD5
6e9d2ef6a2146bb9ae5a5cf4d89759bb
-
SHA1
3eff5752741da1c8f786d07021cad8f1237c23e8
-
SHA256
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d
-
SHA512
713362bc1d2b25f4a8ed695f30bd2d340a43df336cbc598d43fafb3f1505c35585ca8ebaa5dadcfb4a0cbab75abc32a33d1ab17b2aee5d1272c60549d5309e18
-
SSDEEP
196608:S3o9iCKRyyrUG5LO875QA++LsjNZuxzqCbcsf3KwUyHXpP9wcoAt7RXGR:ahfLxNa0L8Z2Pgsf3KwUy3JKcjtpGR
-
Rms family
-
UAC bypass
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
1Modify Registry
3