General
-
Target
ee40188bacd94177daf9d87ae44b9c31.bin
-
Size
2.9MB
-
Sample
231121-dvvnhace5z
-
MD5
95c324d056161bbbbcb118f13835976e
-
SHA1
a84cf26962a3cbdba90274d714ac994a856b7def
-
SHA256
d6ab7fe967076db39ead3285fd303dd3df4ed8d79d2a63666feb9d5c0a2d119a
-
SHA512
79a87dc1a370d47da3695349c18aabf8e9f083a3c1711e0e8477ce29ba8afc37192b73627a9e5767bad066e70006f47ee542c42b03913f75e4167c2b68e7d57a
-
SSDEEP
49152:Jk8ZdfMgkQLjOiyFLHWDxTiRuwaVCbMxq+AmZROLQGeKSlNSdRdnT8edMjX4AtKL:zd7vCLH4TO82oqkdGeKGSNT16jX4AtKL
Behavioral task
behavioral1
Sample
13a7e8de46706c0921cfe6e10d0a8dad139c1dcfb78c7ed6b635bc90821d0d4f.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
13a7e8de46706c0921cfe6e10d0a8dad139c1dcfb78c7ed6b635bc90821d0d4f.exe
-
Size
3.0MB
-
MD5
ee40188bacd94177daf9d87ae44b9c31
-
SHA1
96c43fd4c818d545bb2322c4a2ea5f3671a6d86a
-
SHA256
13a7e8de46706c0921cfe6e10d0a8dad139c1dcfb78c7ed6b635bc90821d0d4f
-
SHA512
506274fc0f81bd132876286dd9a56ce3fee2ef455c724a9389b52b11e99bc1b0fd4514ccda5f4fedd331862f15f27d5347442db8a21e81b77979f7d4c5f66541
-
SSDEEP
49152:cl09kS3mE0w9UCregO8V6duBGJivPtGT+1uP+DspG5MxHoH+SN9PIU:cl09x2IuCre4V6duBGitTLsQMxIH+iIU
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-