General
-
Target
SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe
-
Size
5.7MB
-
Sample
231122-masg3scc9s
-
MD5
c0ef9d267c5557088c0724b75f1d10b5
-
SHA1
160a3a4bd2522bf2da9959d46bef2066d69b4e35
-
SHA256
2b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d
-
SHA512
ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031
-
SSDEEP
98304:Pl1miR1gYgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJvHfc10YS29F+bfbJBQJqP:ZgYgNvpbXZ778hsIvY6j15fc1S26TbvP
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe
-
Size
5.7MB
-
MD5
c0ef9d267c5557088c0724b75f1d10b5
-
SHA1
160a3a4bd2522bf2da9959d46bef2066d69b4e35
-
SHA256
2b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d
-
SHA512
ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031
-
SSDEEP
98304:Pl1miR1gYgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJvHfc10YS29F+bfbJBQJqP:ZgYgNvpbXZ778hsIvY6j15fc1S26TbvP
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-