General
-
Target
c7e3680ddd9bef78e9c560e9955586d2
-
Size
2.5MB
-
Sample
240314-gy7c9ace7w
-
MD5
c7e3680ddd9bef78e9c560e9955586d2
-
SHA1
7865dbdc90deb54e945eb8d8890b48d551ec2241
-
SHA256
5b667765d8073353f1404e2050d3211d6a346f83fc8fd647d49a3700c1299ae6
-
SHA512
032d7a9a2bf4e07f3e62338c89e9d2acd25b7234db5ae780d6836124396f1181fc0b9d8563e55468e343ebdcbed98fef21427e2eda37b7cf6c6744a46097dfec
-
SSDEEP
49152:D8m9uvHDN74Rdctvz0cuXWJabsdxwHzotCiVISQj8ZbYOqoh8tDfFobSJn3HJxhX:gmsvHDNUPQvzH+Wcsdxw04PSQ4ZUOqm4
Behavioral task
behavioral1
Sample
c7e3680ddd9bef78e9c560e9955586d2.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
c7e3680ddd9bef78e9c560e9955586d2
-
Size
2.5MB
-
MD5
c7e3680ddd9bef78e9c560e9955586d2
-
SHA1
7865dbdc90deb54e945eb8d8890b48d551ec2241
-
SHA256
5b667765d8073353f1404e2050d3211d6a346f83fc8fd647d49a3700c1299ae6
-
SHA512
032d7a9a2bf4e07f3e62338c89e9d2acd25b7234db5ae780d6836124396f1181fc0b9d8563e55468e343ebdcbed98fef21427e2eda37b7cf6c6744a46097dfec
-
SSDEEP
49152:D8m9uvHDN74Rdctvz0cuXWJabsdxwHzotCiVISQj8ZbYOqoh8tDfFobSJn3HJxhX:gmsvHDNUPQvzH+Wcsdxw04PSQ4ZUOqm4
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-