General
-
Target
f94a2299d0fe2837603734bbf0c3c161
-
Size
4.9MB
-
Sample
231228-1axzfscbg8
-
MD5
f94a2299d0fe2837603734bbf0c3c161
-
SHA1
15f2d0ea4daf45e0418cd3e2dcfa55bdd1e6d819
-
SHA256
746b35c07eefaba6dd40aa5a8b2389eb1ca04bed6ba23acd0a732a7148f3f258
-
SHA512
0fa446b5d20618053d46ff96c538d40deee2da4811c63b876f479ea04442493b9d8675bafdc68a018d5abe4dca78ddaf8b9af46c2586fbe7fafe639613f3d5cd
-
SSDEEP
98304:fZS0r0bsJoWIUJMKXZy2rdh6RPYFBW6MLrPZsPKZVGOZNmOrTAn:hSHsSWHE0kPYFB0ZsPS8YNHT
Static task
static1
Behavioral task
behavioral1
Sample
f94a2299d0fe2837603734bbf0c3c161.exe
Resource
win7-20231129-en
Malware Config
Extracted
bitrat
1.33
serviceop091.ddns.net:8035
-
communication_password
c4ca4238a0b923820dcc509a6f75849b
-
tor_process
tor
Targets
-
-
Target
f94a2299d0fe2837603734bbf0c3c161
-
Size
4.9MB
-
MD5
f94a2299d0fe2837603734bbf0c3c161
-
SHA1
15f2d0ea4daf45e0418cd3e2dcfa55bdd1e6d819
-
SHA256
746b35c07eefaba6dd40aa5a8b2389eb1ca04bed6ba23acd0a732a7148f3f258
-
SHA512
0fa446b5d20618053d46ff96c538d40deee2da4811c63b876f479ea04442493b9d8675bafdc68a018d5abe4dca78ddaf8b9af46c2586fbe7fafe639613f3d5cd
-
SSDEEP
98304:fZS0r0bsJoWIUJMKXZy2rdh6RPYFBW6MLrPZsPKZVGOZNmOrTAn:hSHsSWHE0kPYFB0ZsPS8YNHT
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-