General
-
Target
Payment advice.exe
-
Size
664KB
-
Sample
230125-l7xmmaff73
-
MD5
c59007226b76f19d81731c274478a91f
-
SHA1
226308c36c0a4f7b63a46e470f0d79c217c03a07
-
SHA256
c2d1359274d63fa192cfa5e08e73328b47170d2be743dee89bae0555eef65ace
-
SHA512
0b15bfbdab99569764d7ed50328c73761cb44c8def6081693abf0ff91aab0d202d80c286b9c7422700dea8844890c2ee76f790b93116b4274353e678eb3ee343
-
SSDEEP
12288:20Q4KjkKYrubiXG+IF8zIqW5temxhjejvnapEOfr52oj1fpiC0mn/Yic4:oolr6Ue87W5tem2jAlr5lVwic4
Static task
static1
Behavioral task
behavioral1
Sample
Payment advice.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
Payment advice.exe
-
Size
664KB
-
MD5
c59007226b76f19d81731c274478a91f
-
SHA1
226308c36c0a4f7b63a46e470f0d79c217c03a07
-
SHA256
c2d1359274d63fa192cfa5e08e73328b47170d2be743dee89bae0555eef65ace
-
SHA512
0b15bfbdab99569764d7ed50328c73761cb44c8def6081693abf0ff91aab0d202d80c286b9c7422700dea8844890c2ee76f790b93116b4274353e678eb3ee343
-
SSDEEP
12288:20Q4KjkKYrubiXG+IF8zIqW5temxhjejvnapEOfr52oj1fpiC0mn/Yic4:oolr6Ue87W5tem2jAlr5lVwic4
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-