General
-
Target
SalesAndTales.zip
-
Size
4.1MB
-
Sample
240709-yddc4s1grp
-
MD5
c0b1e4436b0f695734f3354152f6f4f3
-
SHA1
7916e2f4c0107c768bc66308f2f7dc5cedf2b1f2
-
SHA256
3c2964a659a4c597aea369db6c7faddd4b314c699839249ea6392feaa8b479d2
-
SHA512
bf36b6a8ee485c309e51e6d358aef055c68338d744b77a6dfe474fc47e9f0b79d6f59e28d73a7a7769e65c60b5e785f83d28e7d09cd4f68c903290302d68b1f3
-
SSDEEP
98304:7lSDHUWb5JX09MLEwE8iQSHPRR6w68owtVaYTNd8:78ThHk9MXEhvHOYhd8
Behavioral task
behavioral1
Sample
SalesAndTales/SalesAndTales/TalesAndSales.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SalesAndTales/SalesAndTales/TalesAndSales.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
discordrat
-
discord_token
MTI2MDIzODIzNTAxNjM2NDE0Mw.G_GGTS.fEW6l1WLOhjwEn42Roi-bpXTe-ZL_rK7J-jOto
-
server_id
1260238572166844487
Targets
-
-
Target
SalesAndTales/SalesAndTales/TalesAndSales.exe
-
Size
4.1MB
-
MD5
5071e6c3739ca8d176036501ff7b7692
-
SHA1
0e0ef970dc94a375a28b61baff395043c920484b
-
SHA256
dc8d4767a1022103802ec64fe86960bea13dd03ff1d0365c2519c7edc07b4841
-
SHA512
1c9e56a50ac7a3ee175d70b1e456cd69279fe94aac95ea66f4d1f782d2687b33f9c7b0a20d29a49ed06508279dc34f2d4d05ad5fb396a526226e27e93614753f
-
SSDEEP
98304:iUYt9cvtfCbuDlZM5Arxle1K+O9FbcBvzc8aEB:iUc9cv9EQ7oOx01awV
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-