General
-
Target
b4d965c427f37d900c4cdc0257542d33ad436efcf30a69dd006aa3321a90bc7c
-
Size
4.4MB
-
Sample
220708-ywjylsehhj
-
MD5
0c09d75a290024791e700607ecea59e3
-
SHA1
e69abb2295667c1ad8abae715c5ed10b387b0bb8
-
SHA256
b4d965c427f37d900c4cdc0257542d33ad436efcf30a69dd006aa3321a90bc7c
-
SHA512
1bb58ffa224869a2ceb7a9af83de6e5aad99c899b67888e17329836a959058f92133373a015ffae945d9b2c0769a9b1b49a034d5f87bf3dc0fb189b739cdd7b0
Static task
static1
Behavioral task
behavioral1
Sample
b4d965c427f37d900c4cdc0257542d33ad436efcf30a69dd006aa3321a90bc7c.exe
Resource
win7-20220414-en
Malware Config
Extracted
bitrat
1.33
23.105.131.186:9000
-
communication_password
c4ca4238a0b923820dcc509a6f75849b
-
tor_process
tor
Targets
-
-
Target
b4d965c427f37d900c4cdc0257542d33ad436efcf30a69dd006aa3321a90bc7c
-
Size
4.4MB
-
MD5
0c09d75a290024791e700607ecea59e3
-
SHA1
e69abb2295667c1ad8abae715c5ed10b387b0bb8
-
SHA256
b4d965c427f37d900c4cdc0257542d33ad436efcf30a69dd006aa3321a90bc7c
-
SHA512
1bb58ffa224869a2ceb7a9af83de6e5aad99c899b67888e17329836a959058f92133373a015ffae945d9b2c0769a9b1b49a034d5f87bf3dc0fb189b739cdd7b0
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-