General
-
Target
5DD0F3EF8FBDEE1796E6D982466BF65E.exe
-
Size
2.7MB
-
Sample
240716-dwbxsavhle
-
MD5
5dd0f3ef8fbdee1796e6d982466bf65e
-
SHA1
aa8958821102f0e6528156c487ad647f45066244
-
SHA256
d6c46400ac8ac5d5a7c2820a211b6a760495e4f58e76b72b09bb5819c294674d
-
SHA512
c9e1748a99b490a12ea37d16fe20ce9ba0cf0e001db74b1f40fe4e8ee01cea2837748730e3b17120c268c279c113a927f87c65a593b246d55144a636f549591b
-
SSDEEP
49152:qBojA1ji5x7BJ+IUnlccwyUnY6oMu901XV:qU578Iecc29oMw01F
Static task
static1
Behavioral task
behavioral1
Sample
5DD0F3EF8FBDEE1796E6D982466BF65E.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
5DD0F3EF8FBDEE1796E6D982466BF65E.exe
-
Size
2.7MB
-
MD5
5dd0f3ef8fbdee1796e6d982466bf65e
-
SHA1
aa8958821102f0e6528156c487ad647f45066244
-
SHA256
d6c46400ac8ac5d5a7c2820a211b6a760495e4f58e76b72b09bb5819c294674d
-
SHA512
c9e1748a99b490a12ea37d16fe20ce9ba0cf0e001db74b1f40fe4e8ee01cea2837748730e3b17120c268c279c113a927f87c65a593b246d55144a636f549591b
-
SSDEEP
49152:qBojA1ji5x7BJ+IUnlccwyUnY6oMu901XV:qU578Iecc29oMw01F
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-