General
-
Target
Vape V4.exe
-
Size
42KB
-
Sample
210709-kqt43n2hz6
-
MD5
919b60c62ed64aa128f5a73f4c1a4b4f
-
SHA1
23178189e308ca9e814caa2cad4ddf472e726b3f
-
SHA256
050e1b254473b7bbb2214fe09aa93f2dc01793331106edb7f03fc834ca0a6b17
-
SHA512
37941898baa7353e63b0934d80a931746bdfe5219e2972eec6dc6c05057ec420489331cf8313be21df69bb8e0f3f8a58279c27d458d241ba225e169e027d0817
Static task
static1
Behavioral task
behavioral1
Sample
Vape V4.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Vape V4.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Vape V4.exe
-
Size
42KB
-
MD5
919b60c62ed64aa128f5a73f4c1a4b4f
-
SHA1
23178189e308ca9e814caa2cad4ddf472e726b3f
-
SHA256
050e1b254473b7bbb2214fe09aa93f2dc01793331106edb7f03fc834ca0a6b17
-
SHA512
37941898baa7353e63b0934d80a931746bdfe5219e2972eec6dc6c05057ec420489331cf8313be21df69bb8e0f3f8a58279c27d458d241ba225e169e027d0817
Score9/10-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-