General
-
Target
NEAS.99bba4b98096259772dc0c12f0ebb3b3ff275f4babf75caa380e94e3dbed90c9exe_JC.exe
-
Size
501KB
-
Sample
231023-v75gxabf5v
-
MD5
b1f7d94305e0f729964239a69bffe320
-
SHA1
2fb02ffda0ce1fc5d719b9b79f2cdc2a0ead863a
-
SHA256
99bba4b98096259772dc0c12f0ebb3b3ff275f4babf75caa380e94e3dbed90c9
-
SHA512
3d6089b7b0f430020bb3a21e21aedbff81c28e8e97bb44c8b0fd6af1ea4bf6356a34b9bdf56bcdf51533dab48fa6446b825e1dbaa8ed38b380222f81bca03a45
-
SSDEEP
12288:VFTTWyVmRw8r6+y3QqBZAnYanJ252Wjx1ZP2BJ4iP:VFxVn8m+y3QqBZ6RK11Zw4q
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.99bba4b98096259772dc0c12f0ebb3b3ff275f4babf75caa380e94e3dbed90c9exe_JC.exe
Resource
win7-20231020-en
Malware Config
Targets
-
-
Target
NEAS.99bba4b98096259772dc0c12f0ebb3b3ff275f4babf75caa380e94e3dbed90c9exe_JC.exe
-
Size
501KB
-
MD5
b1f7d94305e0f729964239a69bffe320
-
SHA1
2fb02ffda0ce1fc5d719b9b79f2cdc2a0ead863a
-
SHA256
99bba4b98096259772dc0c12f0ebb3b3ff275f4babf75caa380e94e3dbed90c9
-
SHA512
3d6089b7b0f430020bb3a21e21aedbff81c28e8e97bb44c8b0fd6af1ea4bf6356a34b9bdf56bcdf51533dab48fa6446b825e1dbaa8ed38b380222f81bca03a45
-
SSDEEP
12288:VFTTWyVmRw8r6+y3QqBZAnYanJ252Wjx1ZP2BJ4iP:VFxVn8m+y3QqBZ6RK11Zw4q
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-