General
-
Target
ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171
-
Size
783KB
-
Sample
220524-3ld2tsbgd8
-
MD5
af453e6dc8439e4856260859e7d68fc1
-
SHA1
031520acf4961f5938f0ceeb2f02e2656667cffb
-
SHA256
ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171
-
SHA512
434afe14ea03edb8988ca23785275a63f8398936811f0b86215c1f4b3f165fc0da352e01aa16206e6f28bf93dee4c0ec21882b08b35adedb55052d7fb54136e3
Static task
static1
Behavioral task
behavioral1
Sample
ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171
-
Size
783KB
-
MD5
af453e6dc8439e4856260859e7d68fc1
-
SHA1
031520acf4961f5938f0ceeb2f02e2656667cffb
-
SHA256
ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171
-
SHA512
434afe14ea03edb8988ca23785275a63f8398936811f0b86215c1f4b3f165fc0da352e01aa16206e6f28bf93dee4c0ec21882b08b35adedb55052d7fb54136e3
-
Modifies WinLogon for persistence
-
HiveRAT Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Modify Registry
4Virtualization/Sandbox Evasion
2