General
-
Target
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe
-
Size
19.8MB
-
Sample
240522-bndqasfh5v
-
MD5
74595855031cc4eb18b48346f876cd2e
-
SHA1
24bf72be8f93f2da8defe6c47004ecde786458ef
-
SHA256
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a
-
SHA512
33227d3e36a95fd4b9fcee533997bab9080a735c52417a10114a01d81c15eebcccca1cb99c6cfaf70691fc5149a41f8cffd4ee5fd54e0a593aaeb1ca6438b240
-
SSDEEP
393216:xao4ZbKh+7uRQSn44pfrovhexQ0s0kl1X5+twDyClkzmv7PXVTpa:xaoAW+qpf6hKQJ+tcH6zmv7Xa
Behavioral task
behavioral1
Sample
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe
-
Size
19.8MB
-
MD5
74595855031cc4eb18b48346f876cd2e
-
SHA1
24bf72be8f93f2da8defe6c47004ecde786458ef
-
SHA256
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a
-
SHA512
33227d3e36a95fd4b9fcee533997bab9080a735c52417a10114a01d81c15eebcccca1cb99c6cfaf70691fc5149a41f8cffd4ee5fd54e0a593aaeb1ca6438b240
-
SSDEEP
393216:xao4ZbKh+7uRQSn44pfrovhexQ0s0kl1X5+twDyClkzmv7PXVTpa:xaoAW+qpf6hKQJ+tcH6zmv7Xa
-
Modifies visiblity of hidden/system files in Explorer
-
XMRig Miner payload
-
Detects executables packed with Themida
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-