General
-
Target
test.zip
-
Size
17.0MB
-
Sample
230425-krew7sbc8x
-
MD5
71c56dcf8559b5812abc95d3d6c10c8d
-
SHA1
ef83ccc4c9e48ac4e5ec8c888a63cefd4b7103af
-
SHA256
1dd7ab2ea6b3117f4ba6ffc1dc39df679146374180557c5b33c5b14f1cb084e3
-
SHA512
dfa53f6055725b94891d5260f73b648118d128f42166d6617117a24ea957ae64294a6d4977cd4641411571f697ddc22485ed507a54614e844804531778f846d0
-
SSDEEP
393216:LG/D/OLkvQTLRDo8PkT0+Z/paufqfq0HAJlmdE4MyaS7G37OXZ:DovYi8PkT0+ZRa8qfA4MHS7G37g
Behavioral task
behavioral1
Sample
test.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
test.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
TACTICAL-2.8.8-release.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
TACTICAL-2.8.8-release.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
unpacked_version.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
unpacked_version.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
version.dll
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
test.zip
-
Size
17.0MB
-
MD5
71c56dcf8559b5812abc95d3d6c10c8d
-
SHA1
ef83ccc4c9e48ac4e5ec8c888a63cefd4b7103af
-
SHA256
1dd7ab2ea6b3117f4ba6ffc1dc39df679146374180557c5b33c5b14f1cb084e3
-
SHA512
dfa53f6055725b94891d5260f73b648118d128f42166d6617117a24ea957ae64294a6d4977cd4641411571f697ddc22485ed507a54614e844804531778f846d0
-
SSDEEP
393216:LG/D/OLkvQTLRDo8PkT0+Z/paufqfq0HAJlmdE4MyaS7G37OXZ:DovYi8PkT0+ZRa8qfA4MHS7G37g
Score1/10 -
-
-
Target
TACTICAL-2.8.8-release.exe
-
Size
18.7MB
-
MD5
7dc7618d9d9d1da9c547e647dcb62343
-
SHA1
e0e70b7d626f15ebbc65e5e277913f42081f0946
-
SHA256
db16aa255d60937cde5204609ac1f51e4f6f808da8579165cb4e03bc8fa1cadb
-
SHA512
70ef869bae47b0fa12c5711d4b26d0e37d96d9ad3c918c3d0a9df1a60790413b0c4d090a16af81e93fc2e6ab47fd0b6cfff13ba283ccb10319982f8754f56820
-
SSDEEP
393216:zZLWanwwgGZohDuR4mh59YpSR2GYxDOj99iaL:zbnwwd2y8p82GYxip9v
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
unpacked_version.dll
-
Size
6.4MB
-
MD5
841df99dd9cebc8a29763c3386d54649
-
SHA1
d3b4d43bc764b2fefe3a089ba408331fc8d2d7a7
-
SHA256
2759fe44509259620d06f162dc45c337ba5ffe5bf480583708d5d0fa822f9442
-
SHA512
fecec6d6f8227e75c119e9c83b7691988f9a9190a4e48222294cfa4e9721498e478b8fb2322975e1e2b06a53c5e5d02211dfe34b140c607bae65ee53ccab84a8
-
SSDEEP
98304:2bng4Lr3Al86dATnRUwAvD3P0HNCB59V4S1iVEMXSxDOwmzJsPF3sBezlnkKcP4:GGdEnRGvbPs44ke3vsPF3C9P
Score7/10 -
-
-
Target
version.dll
-
Size
2.5MB
-
MD5
f9b89da94ed247b257ae8bac48304611
-
SHA1
1637a3228884cf84b8f173e4249f2dc86193329a
-
SHA256
0f84cac377432974a2232b164bfc7451aa5c4445c878387725df97486531fbcd
-
SHA512
1dd2efc11287a1e917e008a826baadb721c68d1a3b8a6e0106306ae6dd85f2adfb782d4eb20d4020160304117ebd115a0c1c4996d84565e232d727eef7212096
-
SSDEEP
49152:+FIlhMg37EU2o+SxDOwmzJQNDPFsx/qssluv7eMSlwGkgaUcPqVn:+VEMXSxDOwmzJsPF3sBezlnkKcP4n
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-