General
-
Target
VapeLite by Antiimperialista.rar
-
Size
13.9MB
-
Sample
240516-x513tace2y
-
MD5
9199e11550985950ba4b47bc9a394381
-
SHA1
4c07bb0101fb80339db8e3e62c7fdcef2419f5f8
-
SHA256
695d9cac264da26f8f0807256058127bfa82407a1816d7ae9131fa90b2f107b0
-
SHA512
a46b96390154f30f14f2666a431dc30813d23255a61d76849f3ed4a2ac55782dd4aa68ee9a64ffeb991e6e4dae81db33f0ab010316183ab128dc2407d2e99ac7
-
SSDEEP
393216:+hU4sPwvaK0W287ISyhrpXhZkRVhFgTqwpFusf0euSqRapu:sUrGsbeISyhrWT3gTqwpFcxRapu
Malware Config
Targets
-
-
Target
VapeLite by Antiimperialista.rar
-
Size
13.9MB
-
MD5
9199e11550985950ba4b47bc9a394381
-
SHA1
4c07bb0101fb80339db8e3e62c7fdcef2419f5f8
-
SHA256
695d9cac264da26f8f0807256058127bfa82407a1816d7ae9131fa90b2f107b0
-
SHA512
a46b96390154f30f14f2666a431dc30813d23255a61d76849f3ed4a2ac55782dd4aa68ee9a64ffeb991e6e4dae81db33f0ab010316183ab128dc2407d2e99ac7
-
SSDEEP
393216:+hU4sPwvaK0W287ISyhrpXhZkRVhFgTqwpFusf0euSqRapu:sUrGsbeISyhrWT3gTqwpFcxRapu
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-