General
-
Target
c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970
-
Size
623KB
-
Sample
240701-csbl6swgmn
-
MD5
2abf09941db488f850f1783e882284c3
-
SHA1
45e3a08a7904dbe4c1da8f771d65ca72d8639494
-
SHA256
c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970
-
SHA512
7ba11d461ea89550acf92ec2f1c89c986b0a08c94c09a1c444db9056f739d017b7dd6bb1f16fda48ceb3340647e0caf57fd1cea6698ed1d358e103bb081e42b8
-
SSDEEP
12288:lEQoSfqaDJYMCQEqO5XJP1wCqt9bKuHLfVNJUhiXhJhG3tF8nW8s0LE:l4lQ9sgxdfVNgiXhDZnW8bE
Behavioral task
behavioral1
Sample
c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970
-
Size
623KB
-
MD5
2abf09941db488f850f1783e882284c3
-
SHA1
45e3a08a7904dbe4c1da8f771d65ca72d8639494
-
SHA256
c2753e1e7246bfdf3eb1f4ec7d289b7faaa135067825fff0e140ebfb3edc8970
-
SHA512
7ba11d461ea89550acf92ec2f1c89c986b0a08c94c09a1c444db9056f739d017b7dd6bb1f16fda48ceb3340647e0caf57fd1cea6698ed1d358e103bb081e42b8
-
SSDEEP
12288:lEQoSfqaDJYMCQEqO5XJP1wCqt9bKuHLfVNJUhiXhJhG3tF8nW8s0LE:l4lQ9sgxdfVNgiXhDZnW8bE
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-