General
-
Target
7923c53381886a69939a56da10dcaa42.exe
-
Size
6.8MB
-
Sample
230321-lnrx2abe7v
-
MD5
7923c53381886a69939a56da10dcaa42
-
SHA1
a9f1879a7784933381548e9b8cf10462c3910693
-
SHA256
2b0487817f8cf2592db53cea34fa30f2db1a06d046759f23f3e72a0dc61034dd
-
SHA512
b701902129a3f067076d2aae6ac5d73c59eb4c843f51f45ad40e0c2103883246b2f0ac4da57368c51ac9dd10f6adcf2d5a78632ee319ca5c47b1d420c9de5d4a
-
SSDEEP
98304:ftyBvUTI3/T/O5JtzAE0A050xf3yhDWbMsnJfdViU7DICtzkcPLC+5HTb/hIekb3:f8JRaXQ2xfaWYsJlVdDIaL9b5fzC/
Static task
static1
Behavioral task
behavioral1
Sample
7923c53381886a69939a56da10dcaa42.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
7923c53381886a69939a56da10dcaa42.exe
-
Size
6.8MB
-
MD5
7923c53381886a69939a56da10dcaa42
-
SHA1
a9f1879a7784933381548e9b8cf10462c3910693
-
SHA256
2b0487817f8cf2592db53cea34fa30f2db1a06d046759f23f3e72a0dc61034dd
-
SHA512
b701902129a3f067076d2aae6ac5d73c59eb4c843f51f45ad40e0c2103883246b2f0ac4da57368c51ac9dd10f6adcf2d5a78632ee319ca5c47b1d420c9de5d4a
-
SSDEEP
98304:ftyBvUTI3/T/O5JtzAE0A050xf3yhDWbMsnJfdViU7DICtzkcPLC+5HTb/hIekb3:f8JRaXQ2xfaWYsJlVdDIaL9b5fzC/
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-