General
-
Target
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
-
Size
799.1MB
-
Sample
221122-hnvgdagf3v
-
MD5
c92f10574719f64de71f15142e927922
-
SHA1
bc1c5d3a8481f8fda448c55d821da9b2f55fed66
-
SHA256
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
-
SHA512
b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6
-
SSDEEP
98304:NjtiC2lkD5L18CJVE0CGTtHdxpXP3UDSMOKS6gqiLZFIfbdSK3m:VtP58CrZf3iVrS6gqCZFcxD2
Behavioral task
behavioral1
Sample
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
systembc
212.8.244.5:4001
192.168.1.149:4001
Targets
-
-
Target
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
-
Size
799.1MB
-
MD5
c92f10574719f64de71f15142e927922
-
SHA1
bc1c5d3a8481f8fda448c55d821da9b2f55fed66
-
SHA256
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
-
SHA512
b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6
-
SSDEEP
98304:NjtiC2lkD5L18CJVE0CGTtHdxpXP3UDSMOKS6gqiLZFIfbdSK3m:VtP58CrZf3iVrS6gqCZFcxD2
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-