General
-
Target
4423890.RAR
-
Size
11.2MB
-
Sample
240515-n495nagc6y
-
MD5
ff7553a8d62ba75491119628aa7ede6e
-
SHA1
105b16f65c61570fd9c6ff2077597ba626026cda
-
SHA256
58fb41c622cfccae8febc06e0c04f25bdb613a5b260ae6f404e9d0eda5ea86ab
-
SHA512
ee01b5273fa7fb49eb8f55b995174bb869ebe77854427c4691e8980f5c2b49eef66a9e3fc8ecb6dd2388f390423318653b3573d1002af3124c70a42ed5815c22
-
SSDEEP
196608:f9VizBum/MJuS5PuZBv5z7/AGUnfbhI7epRSv6EjBGu0wcDGIuPJGopuS5R:X4BF/GuS5PuZLQGOfeavSNjgu0tiI1o/
Static task
static1
Malware Config
Targets
-
-
Target
4423890.RAR
-
Size
11.2MB
-
MD5
ff7553a8d62ba75491119628aa7ede6e
-
SHA1
105b16f65c61570fd9c6ff2077597ba626026cda
-
SHA256
58fb41c622cfccae8febc06e0c04f25bdb613a5b260ae6f404e9d0eda5ea86ab
-
SHA512
ee01b5273fa7fb49eb8f55b995174bb869ebe77854427c4691e8980f5c2b49eef66a9e3fc8ecb6dd2388f390423318653b3573d1002af3124c70a42ed5815c22
-
SSDEEP
196608:f9VizBum/MJuS5PuZBv5z7/AGUnfbhI7epRSv6EjBGu0wcDGIuPJGopuS5R:X4BF/GuS5PuZLQGOfeavSNjgu0tiI1o/
-
DarkTrack payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-