General
-
Target
67705d481158934ba9bf1785c56072a7.exe
-
Size
6MB
-
Sample
230410-j548ksgb93
-
MD5
67705d481158934ba9bf1785c56072a7
-
SHA1
ff5a7c90f12240ea409ba452adbc913cbce61d73
-
SHA256
a9b3f51f97dcb1ed34cc2b9d1664b597b38bdb7f6efc21418489b8e970b4c2cc
-
SHA512
9aea9544f46570e50c2a298a942f672d19611bd5febd1ee3bd9df2fb4476fa26875276adce9bde1cb84c1a0fb739c3c08107848bfc97cfd673b6a6a5cabbd111
-
SSDEEP
98304:/7gtOaxhH6+qLjWiaeFqaowwhXcRIVDNbTeGQtkpip:COQLeFRoeRIbTeGq
Static task
static1
Behavioral task
behavioral1
Sample
67705d481158934ba9bf1785c56072a7.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
67705d481158934ba9bf1785c56072a7.exe
-
Size
6MB
-
MD5
67705d481158934ba9bf1785c56072a7
-
SHA1
ff5a7c90f12240ea409ba452adbc913cbce61d73
-
SHA256
a9b3f51f97dcb1ed34cc2b9d1664b597b38bdb7f6efc21418489b8e970b4c2cc
-
SHA512
9aea9544f46570e50c2a298a942f672d19611bd5febd1ee3bd9df2fb4476fa26875276adce9bde1cb84c1a0fb739c3c08107848bfc97cfd673b6a6a5cabbd111
-
SSDEEP
98304:/7gtOaxhH6+qLjWiaeFqaowwhXcRIVDNbTeGQtkpip:COQLeFRoeRIbTeGq
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-