General
-
Target
Set-up-lighter.zip
-
Size
5.5MB
-
Sample
221127-v6cqhaae6s
-
MD5
42256aba6fbdbf68842b64207b75a48a
-
SHA1
5696fc1de5a97ebc5ff0bc07ed103b5c935f106c
-
SHA256
572cf96f621410c12b54911b8bd286b44de70a3e143e536b060dce99d5751eb7
-
SHA512
42620d18b640e0ef9e8b043e3d6d918c3189969a0e935f15a35fc001402662c208a72766000d7c7f0c73a2d850b6858fffcf217b21074c1247bb0efbf2b913d7
-
SSDEEP
98304:5Drxl0oKOfQwhOik2Jfg5iZ3nYgsWQmdEj5A2dzytciLIsKN5pGFF:dxl0opfbMn2Ngk3daj5mtPJ
Static task
static1
Behavioral task
behavioral1
Sample
Set-up-lighter.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
Set-up-lighter.exe
-
Size
5.8MB
-
MD5
6424ba9f7c036fa497c991018a09e182
-
SHA1
f8c0bde1d722805c874eae92d776610aa10306fe
-
SHA256
7e04e86e08094ab27371e4b9d5307f47a16043300b48a928273b1314f8a9daca
-
SHA512
e78bb0d1c824396ed720d805df8c19510321b13e34aa7dcaeb79c4e20c5faf44a8c6f056e8629bcc74b2bfdecb201afcd9c1636664ba318cbb7e63b80f5be47b
-
SSDEEP
98304:jxLMYUeMsfIOmQg40J1iZkfd7YkmU8uDSrf82pznNsLbZoiY:VMYUe3fwQv07iERBOrfBKo
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-