General
-
Target
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e
-
Size
938KB
-
Sample
220414-hprrwaadhn
-
MD5
6b2c64128bf247c7b987c65c9de3f81c
-
SHA1
1629ef7f8e13baa063afc0f97a5cb755b68e331f
-
SHA256
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e
-
SHA512
11ac5c09556cf0d99a7ad5d38ca397edcb4c9ce188706729f85b56eb07973d448bed9c8864b542a51e25f33dec6f5b1c4499b95855874b3113b8becc3a6114bb
Static task
static1
Behavioral task
behavioral1
Sample
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe
Resource
win10v2004-20220310-en
Malware Config
Targets
-
-
Target
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e
-
Size
938KB
-
MD5
6b2c64128bf247c7b987c65c9de3f81c
-
SHA1
1629ef7f8e13baa063afc0f97a5cb755b68e331f
-
SHA256
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e
-
SHA512
11ac5c09556cf0d99a7ad5d38ca397edcb4c9ce188706729f85b56eb07973d448bed9c8864b542a51e25f33dec6f5b1c4499b95855874b3113b8becc3a6114bb
Score10/10-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
-
suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL
suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-