General
-
Target
b087a691094f9fdd25b7b1828ff7d9fb
-
Size
4.6MB
-
Sample
240303-156j3sae88
-
MD5
b087a691094f9fdd25b7b1828ff7d9fb
-
SHA1
78882a7d0aef6b8b1a190fa50ea82373bf4d3b88
-
SHA256
954eeaefa91f80e80df9cc550c0cc16f52ad063f8ca3494c40ebc5c51ebc635b
-
SHA512
4f4e1e6da8b96b1984ba4f5a378b442c5671940af3c0fbd2102b6ba4ef15259d88f23e2df38770e91f2389dd439c507561dec820ad471b14148a28fc747b3a83
-
SSDEEP
98304:RM3sD4Wo+QeyE5fjBdsc+zm4o6kz5KRVBQAWBxfGU:RM3sD4WSDe8rPkz5KFRu
Static task
static1
Behavioral task
behavioral1
Sample
b087a691094f9fdd25b7b1828ff7d9fb.exe
Resource
win7-20240221-en
Malware Config
Extracted
bitrat
1.33
serviceop091.ddns.net:8000
-
communication_password
c4ca4238a0b923820dcc509a6f75849b
-
tor_process
tor
Targets
-
-
Target
b087a691094f9fdd25b7b1828ff7d9fb
-
Size
4.6MB
-
MD5
b087a691094f9fdd25b7b1828ff7d9fb
-
SHA1
78882a7d0aef6b8b1a190fa50ea82373bf4d3b88
-
SHA256
954eeaefa91f80e80df9cc550c0cc16f52ad063f8ca3494c40ebc5c51ebc635b
-
SHA512
4f4e1e6da8b96b1984ba4f5a378b442c5671940af3c0fbd2102b6ba4ef15259d88f23e2df38770e91f2389dd439c507561dec820ad471b14148a28fc747b3a83
-
SSDEEP
98304:RM3sD4Wo+QeyE5fjBdsc+zm4o6kz5KRVBQAWBxfGU:RM3sD4WSDe8rPkz5KFRu
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-