General
-
Target
Glycan.exe
-
Size
588KB
-
Sample
221108-h3jy7afcgq
-
MD5
fe681fa0b257e52fe02b46a7586aa8a4
-
SHA1
0850bf52d26c57711a3156aa4157eee57cbcb3b2
-
SHA256
27814b2c2db98facd2b30c90414d7fc0deb59ea01b7b63a5c7e7da015da98273
-
SHA512
d1e9dfb6f6effeda348c1d2236d7d13041e54162c73e6bb3a335df5d0d0aacacba718e6954755f6b42f892328d842de88143aef3203c887f5e5732f6a3f039f7
-
SSDEEP
12288:OQZmZPOsxmuCO6nZ63sw5lp4m7NM4fGxt5Ug90GxgIp:6ROsPCO6ZAlSGGx/nx3
Static task
static1
Behavioral task
behavioral1
Sample
Glycan.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Glycan.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
bitrat
1.38
davidmanne.casacam.net:2223
-
communication_password
b6c6e855edf908ec7c12ce8c8e628a5c
-
tor_process
tor
Targets
-
-
Target
Glycan.exe
-
Size
588KB
-
MD5
fe681fa0b257e52fe02b46a7586aa8a4
-
SHA1
0850bf52d26c57711a3156aa4157eee57cbcb3b2
-
SHA256
27814b2c2db98facd2b30c90414d7fc0deb59ea01b7b63a5c7e7da015da98273
-
SHA512
d1e9dfb6f6effeda348c1d2236d7d13041e54162c73e6bb3a335df5d0d0aacacba718e6954755f6b42f892328d842de88143aef3203c887f5e5732f6a3f039f7
-
SSDEEP
12288:OQZmZPOsxmuCO6nZ63sw5lp4m7NM4fGxt5Ug90GxgIp:6ROsPCO6ZAlSGGx/nx3
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-