General
-
Target
Malicious77c1933c4311390d.exe
-
Size
68KB
-
Sample
230704-scpf4aeb97
-
MD5
c0549318d1ebd8400dffafb37839126e
-
SHA1
95e2529d80809a529ed1bc67d7e4a20a4cc74b88
-
SHA256
77c1933c4311390d9131d1d962138379902158c4cb9a40dd1458ba53565b28f9
-
SHA512
61021ea63df51a89b2a1c6c2de62491639cccac322395e402fce3cf8da2c83dc04a9b5a6072ed5925baa9586d4deab51d627e036174bd3790eff9f434a8d48d0
-
SSDEEP
1536:cCTKEPvB2z1qeFU6IOOUMM513zIjGWvhqooGBO3FZ8BbiUeJ:hMBN+MTzKzvghKBbYJ
Static task
static1
Behavioral task
behavioral1
Sample
Malicious77c1933c4311390d.exe
Resource
win7-20230703-en
Malware Config
Targets
-
-
Target
Malicious77c1933c4311390d.exe
-
Size
68KB
-
MD5
c0549318d1ebd8400dffafb37839126e
-
SHA1
95e2529d80809a529ed1bc67d7e4a20a4cc74b88
-
SHA256
77c1933c4311390d9131d1d962138379902158c4cb9a40dd1458ba53565b28f9
-
SHA512
61021ea63df51a89b2a1c6c2de62491639cccac322395e402fce3cf8da2c83dc04a9b5a6072ed5925baa9586d4deab51d627e036174bd3790eff9f434a8d48d0
-
SSDEEP
1536:cCTKEPvB2z1qeFU6IOOUMM513zIjGWvhqooGBO3FZ8BbiUeJ:hMBN+MTzKzvghKBbYJ
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-