General
-
Target
Client.exe
-
Size
4.1MB
-
Sample
240625-fygxxsscra
-
MD5
6739b48a36b2608c5326f124db06bcb3
-
SHA1
b6adddecfb69b7652f363060aeaec79586ab17f9
-
SHA256
384ffec47a0a4278444b6d27fc893621643dbedbf76715b892625765c65a72ec
-
SHA512
477ab4321b6143de4c88f306585573a70a7cf87150d267369ad33be33a38a3eb5f3b18d3bf92d934b98616bbaf441340d808d612ca6240cd7bb85fae3a476eab
-
SSDEEP
98304:guWzWlWTDZL9Itk77iU/7PCfprx4oKMuk2jv+dXf0:gdfTDZL9sk77yN9u9raXf0
Malware Config
Targets
-
-
Target
Client.exe
-
Size
4.1MB
-
MD5
6739b48a36b2608c5326f124db06bcb3
-
SHA1
b6adddecfb69b7652f363060aeaec79586ab17f9
-
SHA256
384ffec47a0a4278444b6d27fc893621643dbedbf76715b892625765c65a72ec
-
SHA512
477ab4321b6143de4c88f306585573a70a7cf87150d267369ad33be33a38a3eb5f3b18d3bf92d934b98616bbaf441340d808d612ca6240cd7bb85fae3a476eab
-
SSDEEP
98304:guWzWlWTDZL9Itk77iU/7PCfprx4oKMuk2jv+dXf0:gdfTDZL9sk77yN9u9raXf0
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-