General
-
Target
13273e8bbcd46160e0f3e1e7095b0a0ed79fe4f592871661a34a3068c0c1a174
-
Size
4.0MB
-
Sample
220524-vaqx9adgcj
-
MD5
a37a6a4e999d48740013ee70916a392c
-
SHA1
c7cbab63161c97a309b94cd9960660b72fb8eb67
-
SHA256
13273e8bbcd46160e0f3e1e7095b0a0ed79fe4f592871661a34a3068c0c1a174
-
SHA512
542a32839881c42b877ff6aa5f296cae21357a7fb4c04fb37ca07da6623941dcc74a1b9a6b8e577a43fd5853c68d8a6d2f51d5ecc4c3185b258d7554edcca18a
Static task
static1
Behavioral task
behavioral1
Sample
13273e8bbcd46160e0f3e1e7095b0a0ed79fe4f592871661a34a3068c0c1a174.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
13273e8bbcd46160e0f3e1e7095b0a0ed79fe4f592871661a34a3068c0c1a174.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
13273e8bbcd46160e0f3e1e7095b0a0ed79fe4f592871661a34a3068c0c1a174
-
Size
4.0MB
-
MD5
a37a6a4e999d48740013ee70916a392c
-
SHA1
c7cbab63161c97a309b94cd9960660b72fb8eb67
-
SHA256
13273e8bbcd46160e0f3e1e7095b0a0ed79fe4f592871661a34a3068c0c1a174
-
SHA512
542a32839881c42b877ff6aa5f296cae21357a7fb4c04fb37ca07da6623941dcc74a1b9a6b8e577a43fd5853c68d8a6d2f51d5ecc4c3185b258d7554edcca18a
Score10/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Vanilla Rat Payload
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-