General
-
Target
d345138f48b7d610e4f7d280504a5a36
-
Size
2.7MB
-
Sample
240318-mfxc8afa9s
-
MD5
d345138f48b7d610e4f7d280504a5a36
-
SHA1
f4f24851b4249d37bcddebbe3a6084266f7dcf2a
-
SHA256
f5fbd66fa754b518289e512f61ed872924ff06f80ec48dc08bd270b179d783cd
-
SHA512
3e4fe2ad60059e1bfc696dfaeb1399c3a9c01ff44a6728fe6244dc7ebf27d18429c9e0e9b72a05727911ed6337eece15a242b8d5ce0d723350ad459772069c69
-
SSDEEP
49152:6PbUDBy6zxsQZr5nGoL6DGrfTt5L5S2+F96XDumJBAwI8KSWBDfUHM6M6a/9K9zE:68r19k6SGeeKD9fUs6Fa/Y9zztzzK
Static task
static1
Behavioral task
behavioral1
Sample
d345138f48b7d610e4f7d280504a5a36.exe
Resource
win7-20240221-en
Malware Config
Extracted
bitrat
1.38
dopeonlineforwarding.xyz:6620
-
communication_password
d74a214501c1c40b2c77e995082f3587
-
tor_process
tor
Targets
-
-
Target
d345138f48b7d610e4f7d280504a5a36
-
Size
2.7MB
-
MD5
d345138f48b7d610e4f7d280504a5a36
-
SHA1
f4f24851b4249d37bcddebbe3a6084266f7dcf2a
-
SHA256
f5fbd66fa754b518289e512f61ed872924ff06f80ec48dc08bd270b179d783cd
-
SHA512
3e4fe2ad60059e1bfc696dfaeb1399c3a9c01ff44a6728fe6244dc7ebf27d18429c9e0e9b72a05727911ed6337eece15a242b8d5ce0d723350ad459772069c69
-
SSDEEP
49152:6PbUDBy6zxsQZr5nGoL6DGrfTt5L5S2+F96XDumJBAwI8KSWBDfUHM6M6a/9K9zE:68r19k6SGeeKD9fUs6Fa/Y9zztzzK
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-