General
-
Target
tmp
-
Size
2.2MB
-
Sample
240414-zbzzrsch77
-
MD5
2f480ea2e2dfc7accfb621f9b33c5769
-
SHA1
30d1d01b33ded9f6bd8ae9a1964251601e138fa2
-
SHA256
f5f1ae22100a8ff7c59cca8f79c5988e7c3a911fd27e5495616b1bda103c16fa
-
SHA512
17055a67b5bb5d4a35458dd3f51f79490d4da168c725fd5180d96991b658411e2e45a9215442901675fe1bb6f72560c5a8fdcd8f5d13a32012a4b6e57914bbcc
-
SSDEEP
49152:ISUl6vD5DxN6HHLJFwOU+K8ZIFeLhF2+wJQKolCgkhSZ9u3p9HuJsXNWq:ISSwD5Dxka+K8N32xQKoku9u3p5Is
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Malware Config
Extracted
risepro
147.45.47.93:58709
Targets
-
-
Target
tmp
-
Size
2.2MB
-
MD5
2f480ea2e2dfc7accfb621f9b33c5769
-
SHA1
30d1d01b33ded9f6bd8ae9a1964251601e138fa2
-
SHA256
f5f1ae22100a8ff7c59cca8f79c5988e7c3a911fd27e5495616b1bda103c16fa
-
SHA512
17055a67b5bb5d4a35458dd3f51f79490d4da168c725fd5180d96991b658411e2e45a9215442901675fe1bb6f72560c5a8fdcd8f5d13a32012a4b6e57914bbcc
-
SSDEEP
49152:ISUl6vD5DxN6HHLJFwOU+K8ZIFeLhF2+wJQKolCgkhSZ9u3p9HuJsXNWq:ISSwD5Dxka+K8N32xQKoku9u3p5Is
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-