General
-
Target
malware.exe
-
Size
11.2MB
-
Sample
240531-lcczqsea75
-
MD5
80e3aac80e5f5c553e4c4cf74381d99f
-
SHA1
fdac8472eddc8bf8b5c4526c5651ed85de97996e
-
SHA256
d45c674975c17303105e19648eea8de55e8cf084035b10793a4c628b70729144
-
SHA512
5b69e237a5e6de08c066d5e2e31b6832b3f1db333d24a82e600108d5fa645a5d0866aa8e856b13fefe4b6b382e5bcff698af437e6b5f8917f434f8f908a63d3f
-
SSDEEP
196608:BtCbFLyXyLm+2WzU4qrVTcHHRBTue9iSoCVMbgb/x3/18afB:mxL4S2kCVsHRsekTCVxhjB
Behavioral task
behavioral1
Sample
malware.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
malware.exe
-
Size
11.2MB
-
MD5
80e3aac80e5f5c553e4c4cf74381d99f
-
SHA1
fdac8472eddc8bf8b5c4526c5651ed85de97996e
-
SHA256
d45c674975c17303105e19648eea8de55e8cf084035b10793a4c628b70729144
-
SHA512
5b69e237a5e6de08c066d5e2e31b6832b3f1db333d24a82e600108d5fa645a5d0866aa8e856b13fefe4b6b382e5bcff698af437e6b5f8917f434f8f908a63d3f
-
SSDEEP
196608:BtCbFLyXyLm+2WzU4qrVTcHHRBTue9iSoCVMbgb/x3/18afB:mxL4S2kCVsHRsekTCVxhjB
-
DarkTrack payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-