General
-
Target
a9ed1381e07210fbb362eecb1ccd3bb75464bd7f63374c88521d8395fd660ed8
-
Size
989KB
-
Sample
221101-f4v2qsgdd2
-
MD5
8fdeb9288ce47576a8607e2e58ab41e6
-
SHA1
e0c3f9a45831d582f4aedee7390334a1fae5a059
-
SHA256
a9ed1381e07210fbb362eecb1ccd3bb75464bd7f63374c88521d8395fd660ed8
-
SHA512
6e2c48d104662a69fe19f990ccc2dd79f4fde941c323ebcfcb1e1dd57a172afb9c25f98d963a29df6953be9846bf7589dde55b81145d64961f0c5ee19f1f529d
-
SSDEEP
12288:YNvpX+P31dxk8ihCwhuJ9zps7vT2DPC7VLRpelCwT5SoXDDgKTaPubII:yONdxk15uJLs7vycAlrT5ZXvgmh
Static task
static1
Malware Config
Extracted
formbook
ncpr
bVBX5DcJzr9yf94C3w==
pAza9ePFpFp759M=
GeHCdpsX/21yf94C3w==
A86m2jOAb2lCta5KjFGSBLa0Bdru/eQt
bEERX4lbMxXbYU3pYqPIU32+
XLFilcOTXqV04j9CxpgWTXS2
UQTWj58OqzP2ew==
MqVmrtvUwL+EuyI6FfY+xgYaxA==
Fe3ugYgE7GZT3UohKWCrog==
YsWZa7gt9HJXwDhOrwIWTXS2
9mk4g8/Nnlp759M=
g01M0Tsk/vVnrhpC5zZrpw==
ec6PYogewB7aZw==
JveT+/6JbtwGUcTPwA==
EO3y7N6/n5uK0eyQ+bdcU7x9zA==
SRMfKoboyEnEDYOUZWns8TU=
kW15b1o+IOtNpgst5zZrpw==
gUo40RWBHijfIAiuuMdrKA+WMdA=
HvDy2QVdG2cjuiJC7WrE6i4=
uwOMiN8j6q9/966Mltg=
jGl4hoFfLsM2gFepP7yasA==
F9PNZXw2urMl
k2FrywMA6aJo7cQ=
Ng3noMWKcFQ=
EuCdSYcTs1q158o=
PSkxISg1Fva3Bq6Mltg=
owviBgoV5l2741JmLBWt2yw=
poGxVFnHiIswLZqrHO8x
s4GxhtRZS89Ei3D67zF/f1TTdHPftqbF3g==
cURKrRXcL5oGUcTPwA==
/9buSWtJK3Mpdtj01Po8lZHVLL1eOPY0
H45aHTqMYOpwphsrEBWt2yw=
sH6A2FwjBeQ5Z3rUWtthoQ==
+cWc4/rSlSGWuN9+
V71ZMXn/4EYToBMbnAQWTXS2
XjULZr+1mZPtIRd5Hm45
GNvf2ca7mieVzbRhvhWt2yw=
tlOai8pPJq2g9q3Gwg==
roNR+zzHawfLZQ==
DvjMi90/KPOwLg+zPNAMvt0wkNg=
w5NlsQYyva8k
Zs2Ou/8H5bt8BQGCXaQHu90wkNg=
+F0fc8zJvy4howMRzwtLOdir2dnrOa4=
bzoKyxiadPnsg+4bFBWt2yw=
gJ9dNXnjawfLZQ==
sQGNBXFmQjH+iX4OEGnfoJwZ8EKj
W71kR3LUvFp759M=
1KuNrKJmAEO66tNavhWt2yw=
kOJy3d5mQEWzC3+H4C5jHgqc4dnrOa4=
JwWrVtWddVA=
mf23iNlF+LGAbWj2Ut4=
NZdjjpqRbWlLmwke5zZrpw==
m3WDjZyYajwEc2MPjAcWTXS2
LhghnJUq2bEy
G3Mm4RbijgT3eA==
shOpqBODYNmj9q3Gwg==
ontbDjy2awfLZQ==
r3+D+/p5Tq2b9q3Gwg==
ZzVDzkBG5dLEzcNm
bVVTRjUfCtuRHw15Hm45
1j8BKBn537Gu59Y=
H4VSiOs792XTF4e2B3NRy72I4GOD/w==
7Tb4rBHr2U8qlxgunO2+SwwZ8EKj
abdxkcyGTsUlN5qFztm9qA==
youlian.fund
Targets
-
-
Target
a9ed1381e07210fbb362eecb1ccd3bb75464bd7f63374c88521d8395fd660ed8
-
Size
989KB
-
MD5
8fdeb9288ce47576a8607e2e58ab41e6
-
SHA1
e0c3f9a45831d582f4aedee7390334a1fae5a059
-
SHA256
a9ed1381e07210fbb362eecb1ccd3bb75464bd7f63374c88521d8395fd660ed8
-
SHA512
6e2c48d104662a69fe19f990ccc2dd79f4fde941c323ebcfcb1e1dd57a172afb9c25f98d963a29df6953be9846bf7589dde55b81145d64961f0c5ee19f1f529d
-
SSDEEP
12288:YNvpX+P31dxk8ihCwhuJ9zps7vT2DPC7VLRpelCwT5SoXDDgKTaPubII:yONdxk15uJLs7vycAlrT5ZXvgmh
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-