General
-
Target
f1fd2b7e551b16db977e670266a1f905.exe
-
Size
2.0MB
-
Sample
221125-jhk67abe62
-
MD5
f1fd2b7e551b16db977e670266a1f905
-
SHA1
7508ad4cbea2e4928c24d58c30bffde57e08b457
-
SHA256
6c278ae9867cbc45cc7be476e60e455f525655e872b2a8231d36490262dbb7bb
-
SHA512
c5625741c46b99dc936b9e844c83072ffb8f7e3b8ebcb7629670e9880835fd9b0794b3446193702ad621d9da772da154cc37025e68cab23c076fc9c6ddaec0f2
-
SSDEEP
49152:w+kVp8hPXfLoABGZLnv5FmANUc9k4LLXW9bYfhof736:wA18ABGZLnv5FeV4/XOYfAz
Static task
static1
Behavioral task
behavioral1
Sample
f1fd2b7e551b16db977e670266a1f905.exe
Resource
win7-20221111-en
Malware Config
Extracted
systembc
slavelever.info:4248
slavelevereoewl.info:4248
Targets
-
-
Target
f1fd2b7e551b16db977e670266a1f905.exe
-
Size
2.0MB
-
MD5
f1fd2b7e551b16db977e670266a1f905
-
SHA1
7508ad4cbea2e4928c24d58c30bffde57e08b457
-
SHA256
6c278ae9867cbc45cc7be476e60e455f525655e872b2a8231d36490262dbb7bb
-
SHA512
c5625741c46b99dc936b9e844c83072ffb8f7e3b8ebcb7629670e9880835fd9b0794b3446193702ad621d9da772da154cc37025e68cab23c076fc9c6ddaec0f2
-
SSDEEP
49152:w+kVp8hPXfLoABGZLnv5FmANUc9k4LLXW9bYfhof736:wA18ABGZLnv5FeV4/XOYfAz
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-