General
-
Target
a605976f5e046096af71c8fbdc2fb494b8b0af7017d7e1e54ca2d542492d1c4b
-
Size
1.6MB
-
Sample
220418-lapkrahfdn
-
MD5
04a783a64f41dad6086b9d88110dec8e
-
SHA1
8e01e6682475c62ae4ba56456002ff974598eeda
-
SHA256
a605976f5e046096af71c8fbdc2fb494b8b0af7017d7e1e54ca2d542492d1c4b
-
SHA512
6e6f1ae4c47919cf701ae3312286a45a680ad1c11f4239a0de6c8698fd74d20ae48b5fa4d2c7ccb2523d53e5427b1ea34976ef6081bf142ab75ebb1a9e6074b2
Static task
static1
Behavioral task
behavioral1
Sample
a605976f5e046096af71c8fbdc2fb494b8b0af7017d7e1e54ca2d542492d1c4b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a605976f5e046096af71c8fbdc2fb494b8b0af7017d7e1e54ca2d542492d1c4b.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
a605976f5e046096af71c8fbdc2fb494b8b0af7017d7e1e54ca2d542492d1c4b
-
Size
1.6MB
-
MD5
04a783a64f41dad6086b9d88110dec8e
-
SHA1
8e01e6682475c62ae4ba56456002ff974598eeda
-
SHA256
a605976f5e046096af71c8fbdc2fb494b8b0af7017d7e1e54ca2d542492d1c4b
-
SHA512
6e6f1ae4c47919cf701ae3312286a45a680ad1c11f4239a0de6c8698fd74d20ae48b5fa4d2c7ccb2523d53e5427b1ea34976ef6081bf142ab75ebb1a9e6074b2
Score10/10-
Panda Stealer Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-