General
-
Target
e1b9f285e2165ad29046ad53a1bb2bb820e2ba01a6ed438a485b955195e094bc
-
Size
3.4MB
-
Sample
220817-maewzsebdp
-
MD5
a25608f773ecd6f862b1acfda8dd8751
-
SHA1
00aa0fb18b167179edae97826b1ab025a26eb86e
-
SHA256
e1b9f285e2165ad29046ad53a1bb2bb820e2ba01a6ed438a485b955195e094bc
-
SHA512
9b5e2eb51a23ca2114b3ba7105638f17733897a452b041ee5e79df554a97a655ed7f373dc6c5496a82ee24f59d14eb5afd39c93701b49f71b63573a1df9e97a4
-
SSDEEP
98304:kILIwuABPPCYuQqLMFERcrpE6TESI70Zl8ZmAoXOmq2twkIklNFb:vBrHlALMCqdY08ZmAoXOmqnLkl7b
Behavioral task
behavioral1
Sample
Photos/Photos.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Photos/Photos.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
华龙网文化部员工出轨上司过程和图片2.docx.lnk
Resource
win7-20220812-en
Malware Config
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
Photos/Photos.exe
-
Size
3.4MB
-
MD5
701e31c544de5bb9e71a187cb1a8ac0d
-
SHA1
6fed282b0552f6b46ba5aa4ee7fd808ac3508ef5
-
SHA256
2394223aee52cdc73a7fb219e8dc7d07ca67570fc0b20f56d9f46571441f26aa
-
SHA512
0514a3e33bbcab6036a910e8bb57ccadf6a719f20ec780fe29a6e745c2a4eed5e65706094419201c1400ddbc090280594c2d6f0236f0e3b54695e3f72c8696dc
-
SSDEEP
98304:hxY80N21wvM3vM7/CaMn1FOnGSHwn+tx0vn/j:lr1wkk7Kr8wn+Yvn/j
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
华龙网文化部员工出轨上司过程和图片2.docx.lnk
-
Size
637B
-
MD5
8985aa82e561ec2795a1dea38bfe83e6
-
SHA1
2e8f4e0b62d21bd951ab45b1bf15276f8d4f13ac
-
SHA256
558a8b82523011b20c870d5d19ee6fab69b361881c8337720a536e4ca0d7d7f4
-
SHA512
41083bfbb05262babe4fa52af2c0be82f7feaddbba33a552596c3e9e851fbe76a412b12bc5627f25bec8e48b23d85a356d56e05cf5530d9fbbebc584404b1c29
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-