General
-
Target
SOA.exe
-
Size
710KB
-
Sample
230131-kc1kcshd2z
-
MD5
bd9177cc4451c7614dc5ad3d793aa71f
-
SHA1
1331882491ec58f3d324a64d245a487b396587d5
-
SHA256
b1df719e729c278931dd9c1012e4a6906f90364053ea25770712444ec21535ce
-
SHA512
735f83a4c06a750772329278a191c3d0b7d95f8912448d222be3d329596a06c40dbcb45e8e1411beec1fdb6d0ab94aecd2af33974e9a715a4ec811e989dc2965
-
SSDEEP
12288:yS4FR40+w0DtzsROLdrClNDndaIuxAe/CE1OOGOO/OOJQ2R3BDULjR/P3Y/UOHJG:zhzsYxcNDndNuxAe/CEqv03wJfPKIiWO
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SOA.exe
-
Size
710KB
-
MD5
bd9177cc4451c7614dc5ad3d793aa71f
-
SHA1
1331882491ec58f3d324a64d245a487b396587d5
-
SHA256
b1df719e729c278931dd9c1012e4a6906f90364053ea25770712444ec21535ce
-
SHA512
735f83a4c06a750772329278a191c3d0b7d95f8912448d222be3d329596a06c40dbcb45e8e1411beec1fdb6d0ab94aecd2af33974e9a715a4ec811e989dc2965
-
SSDEEP
12288:yS4FR40+w0DtzsROLdrClNDndaIuxAe/CE1OOGOO/OOJQ2R3BDULjR/P3Y/UOHJG:zhzsYxcNDndNuxAe/CEqv03wJfPKIiWO
Score9/10-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-