General
-
Target
0c39642431246745f347de9e82eb9618
-
Size
2.4MB
-
Sample
231230-dda8jafehk
-
MD5
0c39642431246745f347de9e82eb9618
-
SHA1
790ef2b105103e87929f48655625ae56834fb653
-
SHA256
7a3249290a094efd595411b33810028f4417a6b4521fe9369baded0a1672f6e3
-
SHA512
4f6e3af0ce72730fa236e1b110e595dee445830b5af2c3a61159453f6bd0ef2b2b71040c5cc87441109f80d46e3c882c8b1a3a74bb95c2d06c517ceb861d36ad
-
SSDEEP
49152:m6qvNHyKZ2Clq0zkCO78DqWJtjRYm5d4KNliwac6bFnaxVW+g+:kkZmq0zk5OqWJtjr5dzer9bFaWs
Behavioral task
behavioral1
Sample
0c39642431246745f347de9e82eb9618.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
0c39642431246745f347de9e82eb9618
-
Size
2.4MB
-
MD5
0c39642431246745f347de9e82eb9618
-
SHA1
790ef2b105103e87929f48655625ae56834fb653
-
SHA256
7a3249290a094efd595411b33810028f4417a6b4521fe9369baded0a1672f6e3
-
SHA512
4f6e3af0ce72730fa236e1b110e595dee445830b5af2c3a61159453f6bd0ef2b2b71040c5cc87441109f80d46e3c882c8b1a3a74bb95c2d06c517ceb861d36ad
-
SSDEEP
49152:m6qvNHyKZ2Clq0zkCO78DqWJtjRYm5d4KNliwac6bFnaxVW+g+:kkZmq0zk5OqWJtjr5dzer9bFaWs
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-