General
-
Target
Disbalancer.exe
-
Size
5.3MB
-
Sample
220311-r8z22ahhe6
-
MD5
876b71d32631eb0980cf48e839566204
-
SHA1
6bf0b1b8a5a55ee7146ade30257c65b04922889c
-
SHA256
eca6a8e08b30d190a4956e417f1089bde8987aa4377ca40300eea99794d298d6
-
SHA512
661f2d3ab2b8aa6ca580e93dd564504b2b68d5635fe0ac5e9fd730f690a1e7c3abbf4c8ac95d85003c87ebaedf236d37fc1203dc145d41b478bdd04c6a2fe7dc
Static task
static1
Behavioral task
behavioral1
Sample
Disbalancer.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
Disbalancer.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
Disbalancer.exe
-
Size
5.3MB
-
MD5
876b71d32631eb0980cf48e839566204
-
SHA1
6bf0b1b8a5a55ee7146ade30257c65b04922889c
-
SHA256
eca6a8e08b30d190a4956e417f1089bde8987aa4377ca40300eea99794d298d6
-
SHA512
661f2d3ab2b8aa6ca580e93dd564504b2b68d5635fe0ac5e9fd730f690a1e7c3abbf4c8ac95d85003c87ebaedf236d37fc1203dc145d41b478bdd04c6a2fe7dc
-
PhoenixStealer
PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-