General
-
Target
bec10e0f1fa3d6a1485f8590c5d11f082a2c3a57eac821332eca390b18d4c036.zip
-
Size
927KB
-
Sample
240402-q7pz1ace23
-
MD5
f7c3ebd6ede0e08a1a940d79482ecd92
-
SHA1
f21063e2b25caa0cc707638f11c8a3de1f919709
-
SHA256
a1f83e831ff6b6f44b06979932ae12b92f988574d7fe88c5c008a2b935389fee
-
SHA512
4c5ccec18eeadb3a3b0b52e8f6737e58ad65dcd737b832d04b8d5d764724aac8feeb2955c286ea9df41745a20a804574c9fc2e5d9aa3c74f807201e24c739a37
-
SSDEEP
24576:v4NAJo2SJyQsOWZCz0FmhaQdfl0O4d7Bk:v4NAuV4S0FQE72
Static task
static1
Behavioral task
behavioral1
Sample
PO#894.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO#894.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
PO#894.exe
-
Size
1.5MB
-
MD5
9ae482062c306491334cb178fe919a3e
-
SHA1
c2f76bc7512dfc45621fc7f23f8b2deb6c45f5f0
-
SHA256
1f998c6032159b469178389d2cc6debf14c810bd11b3be86a374ee7608d11cac
-
SHA512
8dcd3ad324ada81ac3c40618b3754aa850f9fbdd4ee26105a28bdd39b62ae0625688827eae5499de6358779f150c7c2f790a136d010b7d55169203253a81bddb
-
SSDEEP
24576:PXXQKVZnyHJ/mUgHrxpyUdjYxZi/nLzy+yNzbMCms016w33yd2OluON4fA9uCG:PHQ4nypujrxp5YxZ8LzlyZAd/L3yd2O8
-
Looks for VirtualBox Guest Additions in registry
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1