General
-
Target
86d493785e7f2c546e093fa17dff318c
-
Size
5.1MB
-
Sample
231222-m3fc8agedk
-
MD5
86d493785e7f2c546e093fa17dff318c
-
SHA1
e07a8e97ba3a77f0e873f8788c6415dabdc247ae
-
SHA256
1285210f0e747247cab76cfb24918cb53ffe37adc5698a618718711765c8717a
-
SHA512
e8c30912c76a56c675141ab5ed518eb7f52584d0ec541c85494d18da7dd345db0bcf68bae13c619f6d0d8217a499438fac7ea2d06d34fcc13de05c7eacd87a8c
-
SSDEEP
98304:Oi2QJ4huvvkX0wsf1eiKbcXy8RmogCzNiwrldFtwx4MnuyH2Zo4OR1n0ZY4O:fJ4MvvkX0tfIiKgXyKqqBrlz44Muyj46
Behavioral task
behavioral1
Sample
86d493785e7f2c546e093fa17dff318c.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
86d493785e7f2c546e093fa17dff318c
-
Size
5.1MB
-
MD5
86d493785e7f2c546e093fa17dff318c
-
SHA1
e07a8e97ba3a77f0e873f8788c6415dabdc247ae
-
SHA256
1285210f0e747247cab76cfb24918cb53ffe37adc5698a618718711765c8717a
-
SHA512
e8c30912c76a56c675141ab5ed518eb7f52584d0ec541c85494d18da7dd345db0bcf68bae13c619f6d0d8217a499438fac7ea2d06d34fcc13de05c7eacd87a8c
-
SSDEEP
98304:Oi2QJ4huvvkX0wsf1eiKbcXy8RmogCzNiwrldFtwx4MnuyH2Zo4OR1n0ZY4O:fJ4MvvkX0tfIiKgXyKqqBrlz44Muyj46
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-