General
-
Target
786215476472e75e6ee2be84c1d2e989.bin
-
Size
6.4MB
-
Sample
230327-b7cbksba97
-
MD5
de7d3398fba3fc9a96fbdf5be35a3bf0
-
SHA1
f75d7ed8f535ca1e40eb4dfd23683545bc203254
-
SHA256
c47966bfc7c6128b305486635208635e3b32651137ca91b967dc4b75b5c9244c
-
SHA512
015d88aa0bb281599f4e7e158b783d8073be01c89bd525336e1843f9aed8ca460ee81ea9af2feb839680f45dcd5269da9491b0e208c68a879de03bb9e289dacd
-
SSDEEP
196608:3yFCjrARSmTbWlhcWA24rZ35OiIawGHAqQ:32GARSmTa7cWwtwYs
Static task
static1
Behavioral task
behavioral1
Sample
b06bf1b489aa7448b29376668aeb17392f2a266246010933b9fa38548c146d57.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
b06bf1b489aa7448b29376668aeb17392f2a266246010933b9fa38548c146d57.exe
-
Size
6.8MB
-
MD5
786215476472e75e6ee2be84c1d2e989
-
SHA1
19e7ea1e6cd82a302b68c0642898786bdd2bc489
-
SHA256
b06bf1b489aa7448b29376668aeb17392f2a266246010933b9fa38548c146d57
-
SHA512
42c917ed56eeaa58d391314869d8f099dcf9baff7ab23a39518e171e445d838002a69b04ab941af8b58ce7b7e2d198b3aa9dd8ec929525faa9a02d04d749c7c1
-
SSDEEP
196608:LzJ3OmjEn9v0J+Mq6Br++jcf/27E6AeUStw6qadZm:vJ3OmjE9v0Jhq6ncHQby0qadZm
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-