General
-
Target
A_protected.exe
-
Size
4.8MB
-
Sample
240616-3y297aydnl
-
MD5
2e350ad38505eb0311f8403b7b1c83c4
-
SHA1
de7648fda593e9efa3532b21fd9f686d8b2c9161
-
SHA256
5b9c89db8105bb7b2c9e54a61853ecb427b3616985f2906081436864d1f4c2f2
-
SHA512
b07d6dd091fd57075daabd404b69c97d5b625eb932ad8c84add1ddbbf20dc0527b89fe36b315267d526362a466cf98c725892d6574b100fc0d5cb56d7a545014
-
SSDEEP
98304:L+fImzx6k9pdkAOfRj5dVL5WfRh6kmCZlkR+14759EcY+T/4ffNr:aok9pWAOptMfRhvFZlkAaEjHflr
Behavioral task
behavioral1
Sample
A_protected.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
A_protected.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
discordrat
-
discord_token
MTI1MTM5NDU2MTkzMTA4Nzk2Ng.GVpTiC.aG6daNWB3ZKdyNM0l8rdBK1DppjVAtp5jSZd5E
-
server_id
1251216160561696778
Targets
-
-
Target
A_protected.exe
-
Size
4.8MB
-
MD5
2e350ad38505eb0311f8403b7b1c83c4
-
SHA1
de7648fda593e9efa3532b21fd9f686d8b2c9161
-
SHA256
5b9c89db8105bb7b2c9e54a61853ecb427b3616985f2906081436864d1f4c2f2
-
SHA512
b07d6dd091fd57075daabd404b69c97d5b625eb932ad8c84add1ddbbf20dc0527b89fe36b315267d526362a466cf98c725892d6574b100fc0d5cb56d7a545014
-
SSDEEP
98304:L+fImzx6k9pdkAOfRj5dVL5WfRh6kmCZlkR+14759EcY+T/4ffNr:aok9pWAOptMfRhvFZlkAaEjHflr
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-