General
-
Target
adf2c1710358901e7cc4131c8705ff1b
-
Size
3.1MB
-
Sample
240229-hmgh5ahe2v
-
MD5
adf2c1710358901e7cc4131c8705ff1b
-
SHA1
f7422460048a1bb7df79c40df103c2ea160d51f6
-
SHA256
fe84372f838e5c4ab673dcf10349c94433399d725c9586a2aa2a077f168c2020
-
SHA512
6a966025634645e85a0ade32858510d2e2c29dc5a86e584a3da737aaf27937789deb6855992f23d5f54e43f3a8124b6d74ac65c202babe4e0a4038fafe71fb01
-
SSDEEP
98304:TVrCEpy5HS84pl5NlSHtaJd3Bo5iIenLkQvFvk:TVrXy5Hzo5NkHted3kiIeLfFM
Static task
static1
Behavioral task
behavioral1
Sample
adf2c1710358901e7cc4131c8705ff1b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adf2c1710358901e7cc4131c8705ff1b.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
adf2c1710358901e7cc4131c8705ff1b
-
Size
3.1MB
-
MD5
adf2c1710358901e7cc4131c8705ff1b
-
SHA1
f7422460048a1bb7df79c40df103c2ea160d51f6
-
SHA256
fe84372f838e5c4ab673dcf10349c94433399d725c9586a2aa2a077f168c2020
-
SHA512
6a966025634645e85a0ade32858510d2e2c29dc5a86e584a3da737aaf27937789deb6855992f23d5f54e43f3a8124b6d74ac65c202babe4e0a4038fafe71fb01
-
SSDEEP
98304:TVrCEpy5HS84pl5NlSHtaJd3Bo5iIenLkQvFvk:TVrXy5Hzo5NkHted3kiIeLfFM
Score10/10-
Detects Echelon Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-