General
-
Target
file_v2_0.rar
-
Size
12.7MB
-
Sample
240201-r3z5vahfhr
-
MD5
ef865d4214cbe1f0017c03b9c8b8a080
-
SHA1
92e91daa32b2bf34bb9a5b8d6de610f241568cf8
-
SHA256
c841a0c166bdd4518233a01e9a389af40fa80c972b27e471b2b70bc5c1c817cc
-
SHA512
d1a8637b115be27819ddcc1e6119ccd77d21e3904a3bad84cad82b2d1e3cf2e51deee21b9b931c9c027e2281a5b945239256a85f6407781a4b1cb4f81b99bdc7
-
SSDEEP
393216:889KAmRYZ1GT8s0fQN0bBrBqF759lKb7s3:xcAmou8sOq0bVIF7DY3A
Static task
static1
Behavioral task
behavioral1
Sample
file_v2_0.rar
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
file_v2_0.rar
-
Size
12.7MB
-
MD5
ef865d4214cbe1f0017c03b9c8b8a080
-
SHA1
92e91daa32b2bf34bb9a5b8d6de610f241568cf8
-
SHA256
c841a0c166bdd4518233a01e9a389af40fa80c972b27e471b2b70bc5c1c817cc
-
SHA512
d1a8637b115be27819ddcc1e6119ccd77d21e3904a3bad84cad82b2d1e3cf2e51deee21b9b931c9c027e2281a5b945239256a85f6407781a4b1cb4f81b99bdc7
-
SSDEEP
393216:889KAmRYZ1GT8s0fQN0bBrBqF759lKb7s3:xcAmou8sOq0bVIF7DY3A
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-