General
-
Target
Purchase List Xls.exe
-
Size
1.1MB
-
Sample
231012-jt5d7shf98
-
MD5
fdbce7853fd4e5e1e10d6060f6dae122
-
SHA1
32a258bccbeda4b9bba2d7bbc4679a31fa58bb81
-
SHA256
8838c8ec2ad1e7f3d9b4efcd3c0c2134507988c60915b2a2a6bf10eac2fb3cde
-
SHA512
d2c60a96d930296644ff3672f371c070bc9510ecb479fcc9585d9eedc3b7b2fe0186360570d16aa6ab813c772b821dcd8d55b81752e9de86c136435c0711fbf3
-
SSDEEP
24576:yV1gBwoZLueV335shh2AvxocjcmLH3yd2OluON4fA9uC:yV1zoQAZbAv2vmD3yd2OluON4fA9u
Static task
static1
Behavioral task
behavioral1
Sample
Purchase List Xls.exe
Resource
win7-20230831-en
Malware Config
Extracted
darkcloud
- email_from
- email_to
Targets
-
-
Target
Purchase List Xls.exe
-
Size
1.1MB
-
MD5
fdbce7853fd4e5e1e10d6060f6dae122
-
SHA1
32a258bccbeda4b9bba2d7bbc4679a31fa58bb81
-
SHA256
8838c8ec2ad1e7f3d9b4efcd3c0c2134507988c60915b2a2a6bf10eac2fb3cde
-
SHA512
d2c60a96d930296644ff3672f371c070bc9510ecb479fcc9585d9eedc3b7b2fe0186360570d16aa6ab813c772b821dcd8d55b81752e9de86c136435c0711fbf3
-
SSDEEP
24576:yV1gBwoZLueV335shh2AvxocjcmLH3yd2OluON4fA9uC:yV1zoQAZbAv2vmD3yd2OluON4fA9u
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-