General
-
Target
Electron.zip
-
Size
3.9MB
-
Sample
231106-tspmgacd2s
-
MD5
e4f7021381d73388b2ba9ccdff4c7338
-
SHA1
a2a5451492e95d31d638eab0b380ea668f937d87
-
SHA256
e89d3160f87ebffc0394b1f40d13795aac1a7187e732f3ae634427d5995f6f92
-
SHA512
3d5a40a74e38940ec2bfe0cf392b642c91be302d9c3ac2672ebb80f2d64b52613ecce6d20cf8f7ce7f46c66fe620e89468243b7f0156ce1500f1961253675707
-
SSDEEP
98304:nanflaoWctsuhO1JgyamC5ogHmpdrdDL/K7sZayHZFn1td:nanNLWasTamC5o5drl/JlH31td
Static task
static1
Behavioral task
behavioral1
Sample
Electron/Electron.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
Electron/Electron.exe
Resource
android-x64-arm64-20231023-en
Malware Config
Extracted
gozi
Targets
-
-
Target
Electron/Electron.exe
-
Size
4.0MB
-
MD5
5aad6da9eb1e06fb7a249afc9f4927a8
-
SHA1
c603222e26d5f43a1b5f6fc5347f44ca52df0a58
-
SHA256
83394afef201b339640f94c5d7a054be01a94852edda1efb154de52cd49203e8
-
SHA512
2b997dea2fffc33720bb400d46d3c41549be4481c6dc0e7016a657bab01cf1b4cf35419ea421231c787ea8e3379b97725ac0766575b51b13f723cf21ec302de8
-
SSDEEP
98304:CibxzWoWCzGKFeRWCcqnfN7WSxP1l/RcblYTT4ROHiq1mOc9d8:Cibx/WWFCjJWblw4ROCq10
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-