General
-
Target
file.exe
-
Size
4.3MB
-
Sample
230831-13xt6aag9s
-
MD5
bde9513eb616939033b2b642189c5870
-
SHA1
c2efe843df7108b22e16352c0fa07b50bae4f1c5
-
SHA256
e1b966305ebae686d323721f58e845ce4a4532e9ad8daacfa67f723b3986bf6d
-
SHA512
6d359b0cb8aa93e34c14a12ad47f9cfda0ad6cc4f77d2287f379498986961674afc5225f0717ba8ed7a926d371166b25e9d5c5509a5d44e9f7440df568b53590
-
SSDEEP
98304:u0hdjrfXqL1GoAhrqXd03u8g2EsfGfERiyU+RIGlP:uIdjr4GNZkCbg2dCEMynOyP
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
4.3MB
-
MD5
bde9513eb616939033b2b642189c5870
-
SHA1
c2efe843df7108b22e16352c0fa07b50bae4f1c5
-
SHA256
e1b966305ebae686d323721f58e845ce4a4532e9ad8daacfa67f723b3986bf6d
-
SHA512
6d359b0cb8aa93e34c14a12ad47f9cfda0ad6cc4f77d2287f379498986961674afc5225f0717ba8ed7a926d371166b25e9d5c5509a5d44e9f7440df568b53590
-
SSDEEP
98304:u0hdjrfXqL1GoAhrqXd03u8g2EsfGfERiyU+RIGlP:uIdjr4GNZkCbg2dCEMynOyP
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-