General
-
Target
e66dec71ef0ffbb33127f41b8ab1fe3e.exe
-
Size
1.5MB
-
Sample
230623-p2b1hsgc2w
-
MD5
e66dec71ef0ffbb33127f41b8ab1fe3e
-
SHA1
719e12ef09b6e3ab747421946a57739a649cf483
-
SHA256
240ff64b312acf203a1498a58801bf79ad99617e7dbf961c6a289531d1b7b39b
-
SHA512
1ba9a2f4bc6552339078762acd52b59d2ed3798d49b6b5bf0615f3caa6a315103f3166e8941b94f6d5a01e06dfdd38363e1e6d1091fe046e1697589e57a79959
-
SSDEEP
24576:7UA0Aa/NF9BpvbxxQO/Wh5ChSNF3PWjdCXpKO7Yq8EMHOS8NdOBG7QTOTzgZrkQ3:10xlbBpvHb/Wh5Xv3OjdKKOj8ErRNdu1
Behavioral task
behavioral1
Sample
e66dec71ef0ffbb33127f41b8ab1fe3e.dll
Resource
win7-20230621-en
Malware Config
Extracted
systembc
5.42.65.67:4298
localhost.exchange:4298
Targets
-
-
Target
e66dec71ef0ffbb33127f41b8ab1fe3e.exe
-
Size
1.5MB
-
MD5
e66dec71ef0ffbb33127f41b8ab1fe3e
-
SHA1
719e12ef09b6e3ab747421946a57739a649cf483
-
SHA256
240ff64b312acf203a1498a58801bf79ad99617e7dbf961c6a289531d1b7b39b
-
SHA512
1ba9a2f4bc6552339078762acd52b59d2ed3798d49b6b5bf0615f3caa6a315103f3166e8941b94f6d5a01e06dfdd38363e1e6d1091fe046e1697589e57a79959
-
SSDEEP
24576:7UA0Aa/NF9BpvbxxQO/Wh5ChSNF3PWjdCXpKO7Yq8EMHOS8NdOBG7QTOTzgZrkQ3:10xlbBpvHb/Wh5Xv3OjdKKOj8ErRNdu1
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-