General
-
Target
864d1a4e41a56c8f2e7e7eec89a47638.bin
-
Size
3.4MB
-
Sample
240622-drnqsavfrc
-
MD5
7f7a320683edd7a7656aec593889dac9
-
SHA1
8057146642dad024469fb77fba426ffe8df0218e
-
SHA256
63f0fa0452fcb1afd64ca0258e6dd677493b71187b737f55edcf8c241b5c6a19
-
SHA512
9fe997a661c8c14bf8b75ffc19c12936a843b129f69c89cd43050d0782479fed1ab142164343af5bfb56d05d61360269f3ab786db3b6b296d806f032f4d6ba8b
-
SSDEEP
98304:6t5rFfgk8edJnDIQfQ1Lf5vNdRK2ALoXBWIw:+lR8eLDIEQFhv42AL+2
Static task
static1
Behavioral task
behavioral1
Sample
1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8.exe
-
Size
3.6MB
-
MD5
864d1a4e41a56c8f2e7e7eec89a47638
-
SHA1
1f2cb906b92a945c7346c7139c7722230005c394
-
SHA256
1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8
-
SHA512
547a441369636e2548c7f8f94c3972269e04d80ee5a26803cc222942b28e457be908126fb4ff6bfde2a063ea1ef74ecba2aaceb58c68fba5c4fddcea5fbd91d3
-
SSDEEP
98304:nroESehXGx5IkVu1f/ihp+t49Rd3iG2dEsL:s3ehXzgiSvGiv3tEj
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-