General
-
Target
file.exe
-
Size
3MB
-
Sample
230404-fvwlxada77
-
MD5
6b6e642008b3520c943b073789aabe46
-
SHA1
91c0c61dceec5b4573db84c3886e2735b64328c0
-
SHA256
a059eaa580bbbfa5e2964a0a7a8cf4a40d0bba9df017e05fa1e3c6f408725476
-
SHA512
d884ec35d9964893bcc51c0c83192ab18e2f7be8642d1efeb36ca566b7528f35627ccc443cc5161f2d03cf30089b497a229cfb0b6b13eb3f669b44eae6020b69
-
SSDEEP
49152:hq7I/sBYOo8Ky+hCsGEYJ0fhqcLw3/kj41wrtoK9CDbrqTvePiyLH3AucrpH:hq7IoYRQzJHcslDDOeqVH
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
3MB
-
MD5
6b6e642008b3520c943b073789aabe46
-
SHA1
91c0c61dceec5b4573db84c3886e2735b64328c0
-
SHA256
a059eaa580bbbfa5e2964a0a7a8cf4a40d0bba9df017e05fa1e3c6f408725476
-
SHA512
d884ec35d9964893bcc51c0c83192ab18e2f7be8642d1efeb36ca566b7528f35627ccc443cc5161f2d03cf30089b497a229cfb0b6b13eb3f669b44eae6020b69
-
SSDEEP
49152:hq7I/sBYOo8Ky+hCsGEYJ0fhqcLw3/kj41wrtoK9CDbrqTvePiyLH3AucrpH:hq7IoYRQzJHcslDDOeqVH
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-