General
-
Target
file.exe
-
Size
7.9MB
-
Sample
221103-r8plasbef6
-
MD5
656132a78eeaabea8d8a81569d95282e
-
SHA1
6b684983a1d2de4dcbb56b1a6a8c887505954781
-
SHA256
174957651aa39490a2fa567bb4ca581f97597a7c289de76ebdf55701ffc891f8
-
SHA512
883634ac73e3f246cbe201312fe0869df838282d11203c38eddafbcde87175da94218fbeff1c031c566c7f6287785ed90b964e3a06a5889d3277965ee734e3ef
-
SSDEEP
196608:SCwCI0E5DGKXXzDIV0TYk45gmA8Ut6DFw306uSH1a:HuLDDIIYk45gMUkDFQ0hSVa
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.9MB
-
MD5
656132a78eeaabea8d8a81569d95282e
-
SHA1
6b684983a1d2de4dcbb56b1a6a8c887505954781
-
SHA256
174957651aa39490a2fa567bb4ca581f97597a7c289de76ebdf55701ffc891f8
-
SHA512
883634ac73e3f246cbe201312fe0869df838282d11203c38eddafbcde87175da94218fbeff1c031c566c7f6287785ed90b964e3a06a5889d3277965ee734e3ef
-
SSDEEP
196608:SCwCI0E5DGKXXzDIV0TYk45gmA8Ut6DFw306uSH1a:HuLDDIIYk45gMUkDFQ0hSVa
-
Luca Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-