General
-
Target
c3488845b02c149d06643c8181f5fefe
-
Size
3.1MB
-
Sample
240312-nycl7shh85
-
MD5
c3488845b02c149d06643c8181f5fefe
-
SHA1
b9ded030f6daedbbc970c3ce89f1d9de2bf717d6
-
SHA256
b070a16b8837a3d9242c0e6223bf320bac589e3b1545651a1bcf10abd5ce4fb8
-
SHA512
055b81d4b5796e863fc1dcba64c7293e3af87c8bdd3bf16a4dbbf98a34bbcd43d2f57f9e1633210890a67ed6f2eab20c2cd4efe1fb12f46daac3f97c945773ad
-
SSDEEP
49152:RiUBNffzrYhJLc7g1Brofo5XjURM3tCjd9nY/2RPpuBEwasZOSepDR1:RDdOc75oh3tEnY/0hUG
Behavioral task
behavioral1
Sample
c3488845b02c149d06643c8181f5fefe.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
c3488845b02c149d06643c8181f5fefe
-
Size
3.1MB
-
MD5
c3488845b02c149d06643c8181f5fefe
-
SHA1
b9ded030f6daedbbc970c3ce89f1d9de2bf717d6
-
SHA256
b070a16b8837a3d9242c0e6223bf320bac589e3b1545651a1bcf10abd5ce4fb8
-
SHA512
055b81d4b5796e863fc1dcba64c7293e3af87c8bdd3bf16a4dbbf98a34bbcd43d2f57f9e1633210890a67ed6f2eab20c2cd4efe1fb12f46daac3f97c945773ad
-
SSDEEP
49152:RiUBNffzrYhJLc7g1Brofo5XjURM3tCjd9nY/2RPpuBEwasZOSepDR1:RDdOc75oh3tEnY/0hUG
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-