General
-
Target
d2effe6b2d255c1387d95ef4db27b501b8092e968da23015ea165d95a8d52e85
-
Size
8.8MB
-
Sample
220414-rahebsbegp
-
MD5
8c50928169538c02e83da48cbebdd074
-
SHA1
6565e179585ded5eeff78b6015a70eaef392d36c
-
SHA256
d2effe6b2d255c1387d95ef4db27b501b8092e968da23015ea165d95a8d52e85
-
SHA512
50f9c5f9708d6ad52d6e9cd61ac3031e833853134d1e66c43744f311dc64fb48a04af7a5bf197a1bb7d9a6d26f44bdf52080d1a59fca1ca4e8b816a2d7ac6d2c
Static task
static1
Behavioral task
behavioral1
Sample
d2effe6b2d255c1387d95ef4db27b501b8092e968da23015ea165d95a8d52e85.exe
Resource
win7-20220331-en
Malware Config
Targets
-
-
Target
d2effe6b2d255c1387d95ef4db27b501b8092e968da23015ea165d95a8d52e85
-
Size
8.8MB
-
MD5
8c50928169538c02e83da48cbebdd074
-
SHA1
6565e179585ded5eeff78b6015a70eaef392d36c
-
SHA256
d2effe6b2d255c1387d95ef4db27b501b8092e968da23015ea165d95a8d52e85
-
SHA512
50f9c5f9708d6ad52d6e9cd61ac3031e833853134d1e66c43744f311dc64fb48a04af7a5bf197a1bb7d9a6d26f44bdf52080d1a59fca1ca4e8b816a2d7ac6d2c
-
HiveRAT Payload
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-