General
-
Target
b9d218ecfd1df72128212c8a2fc10ca7
-
Size
4.2MB
-
Sample
240307-2d67zafg49
-
MD5
b9d218ecfd1df72128212c8a2fc10ca7
-
SHA1
8cb9e806b421cc2da6e1cd55aad2f22d3668b2d2
-
SHA256
21d8bc5313b673597a5685c1be7b921fc7721e8b7d706cbc14fc397a0a68bcd2
-
SHA512
e6273a34f12d5a9a8dd8715c187da8948327a023e5e956288de6af26f04c4fe295e8bc755378c41f0ce410a7ff89340b4a5e5bb7dd35e2872ddbb71875ec8719
-
SSDEEP
98304:GnH0P/qajgjmOYQ+j2+d/Oj0q5GGJd+ba9gNxPgtq5jT28:Gn6H0jmcYGz0CdzgNxPV28
Behavioral task
behavioral1
Sample
b9d218ecfd1df72128212c8a2fc10ca7.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
b9d218ecfd1df72128212c8a2fc10ca7
-
Size
4.2MB
-
MD5
b9d218ecfd1df72128212c8a2fc10ca7
-
SHA1
8cb9e806b421cc2da6e1cd55aad2f22d3668b2d2
-
SHA256
21d8bc5313b673597a5685c1be7b921fc7721e8b7d706cbc14fc397a0a68bcd2
-
SHA512
e6273a34f12d5a9a8dd8715c187da8948327a023e5e956288de6af26f04c4fe295e8bc755378c41f0ce410a7ff89340b4a5e5bb7dd35e2872ddbb71875ec8719
-
SSDEEP
98304:GnH0P/qajgjmOYQ+j2+d/Oj0q5GGJd+ba9gNxPgtq5jT28:Gn6H0jmcYGz0CdzgNxPV28
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-