General
-
Target
786215476472e75e6ee2be84c1d2e989.exe
-
Size
6.8MB
-
Sample
230325-xn7t2aga8z
-
MD5
786215476472e75e6ee2be84c1d2e989
-
SHA1
19e7ea1e6cd82a302b68c0642898786bdd2bc489
-
SHA256
b06bf1b489aa7448b29376668aeb17392f2a266246010933b9fa38548c146d57
-
SHA512
42c917ed56eeaa58d391314869d8f099dcf9baff7ab23a39518e171e445d838002a69b04ab941af8b58ce7b7e2d198b3aa9dd8ec929525faa9a02d04d749c7c1
-
SSDEEP
196608:LzJ3OmjEn9v0J+Mq6Br++jcf/27E6AeUStw6qadZm:vJ3OmjE9v0Jhq6ncHQby0qadZm
Static task
static1
Behavioral task
behavioral1
Sample
786215476472e75e6ee2be84c1d2e989.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
786215476472e75e6ee2be84c1d2e989.exe
-
Size
6.8MB
-
MD5
786215476472e75e6ee2be84c1d2e989
-
SHA1
19e7ea1e6cd82a302b68c0642898786bdd2bc489
-
SHA256
b06bf1b489aa7448b29376668aeb17392f2a266246010933b9fa38548c146d57
-
SHA512
42c917ed56eeaa58d391314869d8f099dcf9baff7ab23a39518e171e445d838002a69b04ab941af8b58ce7b7e2d198b3aa9dd8ec929525faa9a02d04d749c7c1
-
SSDEEP
196608:LzJ3OmjEn9v0J+Mq6Br++jcf/27E6AeUStw6qadZm:vJ3OmjE9v0Jhq6ncHQby0qadZm
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-