General
-
Target
1e86e670cc13a073626d32f5d889a612.exe
-
Size
3MB
-
Sample
230405-nzlaqsed69
-
MD5
1e86e670cc13a073626d32f5d889a612
-
SHA1
1f03a3361928de868c03083ce83351f0e8181381
-
SHA256
0b87bee586878a7befc241eacb1e7a5e128fbd131ab6d1c4ec50fa96435ede96
-
SHA512
c76ac96e72738a3654880eb57d6d41db3962b379699d7bc657ab5d02f25002524c8d99211b5533688a98ad9748a7deab8a768ff92034fb0227f3305f5c060120
-
SSDEEP
49152:eV0Uh7kCmdgImd5MwcZyN5Q0VY8BCm5eKClDKsmCPIN7f0sFI2cM+xRRMm:5U6CyRtYCIppJJdOf
Static task
static1
Behavioral task
behavioral1
Sample
1e86e670cc13a073626d32f5d889a612.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
1e86e670cc13a073626d32f5d889a612.exe
-
Size
3MB
-
MD5
1e86e670cc13a073626d32f5d889a612
-
SHA1
1f03a3361928de868c03083ce83351f0e8181381
-
SHA256
0b87bee586878a7befc241eacb1e7a5e128fbd131ab6d1c4ec50fa96435ede96
-
SHA512
c76ac96e72738a3654880eb57d6d41db3962b379699d7bc657ab5d02f25002524c8d99211b5533688a98ad9748a7deab8a768ff92034fb0227f3305f5c060120
-
SSDEEP
49152:eV0Uh7kCmdgImd5MwcZyN5Q0VY8BCm5eKClDKsmCPIN7f0sFI2cM+xRRMm:5U6CyRtYCIppJJdOf
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-