General
-
Target
bat_win_spoofer_V2.exe
-
Size
5.3MB
-
Sample
231122-s5fdwsea6v
-
MD5
a51b03d97b998e3c3fa32cae922da7ee
-
SHA1
762286e273a51c3af772b37528f22c4c11c5d44b
-
SHA256
34cee39adde2085b35877f67de147823542b42abe65b7b0cccee40bc58a5713f
-
SHA512
e00475411326d74a825be3112383684cee5dca67cd00cea5aa62c47a5d56b0330ab7d08e1403051b746aafd722080e7ff484915bd7ab2623413786e4c127bb72
-
SSDEEP
98304:71mP2axDElUcnFcsB+fe74m6n4k/nPS53bGGaW1wcOU6VtbOGmUIjIQ82rjM9gm7:JkolfpM49LdHOU6/O3X+2/M9uE
Behavioral task
behavioral1
Sample
bat_win_spoofer_V2.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
bat_win_spoofer_V2.exe
-
Size
5.3MB
-
MD5
a51b03d97b998e3c3fa32cae922da7ee
-
SHA1
762286e273a51c3af772b37528f22c4c11c5d44b
-
SHA256
34cee39adde2085b35877f67de147823542b42abe65b7b0cccee40bc58a5713f
-
SHA512
e00475411326d74a825be3112383684cee5dca67cd00cea5aa62c47a5d56b0330ab7d08e1403051b746aafd722080e7ff484915bd7ab2623413786e4c127bb72
-
SSDEEP
98304:71mP2axDElUcnFcsB+fe74m6n4k/nPS53bGGaW1wcOU6VtbOGmUIjIQ82rjM9gm7:JkolfpM49LdHOU6/O3X+2/M9uE
Score9/10-
Looks for VirtualBox Guest Additions in registry
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-