General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.dc.19818
-
Size
973KB
-
Sample
201211-jzt41vw3b2
-
MD5
670d8ac68d823b18a7c41bbd2094c2d9
-
SHA1
de92af2af28ddafc1d2946b92d8c67659d1bfa06
-
SHA256
03a2b7c25679c5df3306eac63a257589bc28d9b8b412226964ad13e932a299cc
-
SHA512
b90dc1b91a64981fb262d880c28ad8c6f149f000126884422b76cdeda24315a40a32c57dd2ceee7fd5ef7f20cedccda5ed12f01c328e5cef926c700ed210708a
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.dc.19818.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.dc.19818
-
Size
973KB
-
MD5
670d8ac68d823b18a7c41bbd2094c2d9
-
SHA1
de92af2af28ddafc1d2946b92d8c67659d1bfa06
-
SHA256
03a2b7c25679c5df3306eac63a257589bc28d9b8b412226964ad13e932a299cc
-
SHA512
b90dc1b91a64981fb262d880c28ad8c6f149f000126884422b76cdeda24315a40a32c57dd2ceee7fd5ef7f20cedccda5ed12f01c328e5cef926c700ed210708a
-
NetWire RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Modifies Installed Components in the registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-