General
-
Target
f29903033ff296dbb07a3a869bd7c3b2f135e12ed1be227691040dfe5272677b
-
Size
6.3MB
-
Sample
220524-wvkseacfd3
-
MD5
607afb9f5a1de0e31d5cf6904e60a853
-
SHA1
ac99aafee4902a65c0185f9aab490da3b12b83ae
-
SHA256
f29903033ff296dbb07a3a869bd7c3b2f135e12ed1be227691040dfe5272677b
-
SHA512
356b77f7cd35abfae04149f1bde3f8b84affc6556e411edd9f4ced3355dfd70e9f3840818cfd89e57b94b6867babc20b896507ee4f32b13671ff934f67a0e797
Static task
static1
Behavioral task
behavioral1
Sample
f29903033ff296dbb07a3a869bd7c3b2f135e12ed1be227691040dfe5272677b.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
f29903033ff296dbb07a3a869bd7c3b2f135e12ed1be227691040dfe5272677b
-
Size
6.3MB
-
MD5
607afb9f5a1de0e31d5cf6904e60a853
-
SHA1
ac99aafee4902a65c0185f9aab490da3b12b83ae
-
SHA256
f29903033ff296dbb07a3a869bd7c3b2f135e12ed1be227691040dfe5272677b
-
SHA512
356b77f7cd35abfae04149f1bde3f8b84affc6556e411edd9f4ced3355dfd70e9f3840818cfd89e57b94b6867babc20b896507ee4f32b13671ff934f67a0e797
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-