General
-
Target
GAMESENSEI-CRACKED-2040.zip
-
Size
19.9MB
-
Sample
240719-1typ4asajm
-
MD5
5b4c102a86bd790709fa0f20d215c797
-
SHA1
6d63e258b8b79f872e3f21fc1bb8f75dfb7c5b2e
-
SHA256
1c8b910bf58e62106134170cb3d8af451e2554d9208f51684466b46420758d04
-
SHA512
806805623495a3b1e2c561da619e0f7130d1079bda4170eb89212321c4700f899c6151a0edde71a708cfa676c06f0715b98f39116eff2e7cccba6547dc337e47
-
SSDEEP
393216:eywdS2ou6rreAWMhZ8WN9Aysov0qGbcoVTRDUk3WQMpGj5W4MRr86ZP7p2plPrJw:fR9Z8Q9AP4lpANUk3WQcEW4MRDV2DjJw
Behavioral task
behavioral1
Sample
GAMESENSEI-CRACKED-2040.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1262051087750266910/KhxR_xNjdZvGVJls5o320QK8BdbAvI7ZuNwsyA_FlunAuLOHTdv-7jBqFYmwtMJp6w8f
Targets
-
-
Target
GAMESENSEI-CRACKED-2040.exe
-
Size
20.1MB
-
MD5
9eb5feba62a901025adef7c2ee90b21c
-
SHA1
be54f5c7535709b8a7af748bc6a8b978f44a814c
-
SHA256
d37a4f4ed23694b8a3edf29098970976895b6c47245a783f9c315b4afb578499
-
SHA512
7532bb04e44dd20953141eb71c2930942b7e757fab78f391d8bcaa011655bd69fb78f4cb8e38e6e0c625be2863540f0665e500aadcfa57914a961de578939163
-
SSDEEP
393216:QqkSmYlSLpLFG0zW0zkV8GP870Qj3+thpvLpTWwim72/kpW8wxU:1SLBz1ABUj3+vpvLpTLim7KiQ
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-