General
-
Target
113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66
-
Size
1.2MB
-
Sample
220330-cmb1raafcq
-
MD5
9b2734137accced6a1c34e28ffe9e907
-
SHA1
11de47bc139e4232eb6933075a457e2782fbecd8
-
SHA256
113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66
-
SHA512
eb52ceb42180215d85c2ddaf72a60ab1346c267b0ef9ca25fbc1ad15d766f6097cec432a84f06555b7dfc11a7c6dcec3aac75cad5d15e117c8e37eeda6215e9d
Static task
static1
Behavioral task
behavioral1
Sample
113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66.exe
Resource
win10v2004-20220331-en
Malware Config
Targets
-
-
Target
113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66
-
Size
1.2MB
-
MD5
9b2734137accced6a1c34e28ffe9e907
-
SHA1
11de47bc139e4232eb6933075a457e2782fbecd8
-
SHA256
113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66
-
SHA512
eb52ceb42180215d85c2ddaf72a60ab1346c267b0ef9ca25fbc1ad15d766f6097cec432a84f06555b7dfc11a7c6dcec3aac75cad5d15e117c8e37eeda6215e9d
Score10/10-
Panda Stealer Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-