General
-
Target
e5936e7fcbfc65fdd89d15f767792e86e347df8f0102fff19456a2b344b7334f
-
Size
2.2MB
-
Sample
240727-frf22syfrk
-
MD5
77b2ca092d42a1057be765f0963b280c
-
SHA1
809de147ef849a6690da7cb4a9af8d2bf8f2820b
-
SHA256
e5936e7fcbfc65fdd89d15f767792e86e347df8f0102fff19456a2b344b7334f
-
SHA512
a814670afb5c5f32e2fffba1aa3a0083408446301835d11aa01a75545a05d6e4521e64a61820eabc7829e245651b8ad84ca98767ab846b2186c95b3e014a2ff4
-
SSDEEP
24576:WgMEMOczkzcoFtg3Vakc2hGWvETCTAjPC/SqfZzdaYJRTZQIqmIMyg9VTkpb76uk:AEvcetZavETIA7FkUYJStMyMpy7SN
Static task
static1
Behavioral task
behavioral1
Sample
e5936e7fcbfc65fdd89d15f767792e86e347df8f0102fff19456a2b344b7334f.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
e5936e7fcbfc65fdd89d15f767792e86e347df8f0102fff19456a2b344b7334f
-
Size
2.2MB
-
MD5
77b2ca092d42a1057be765f0963b280c
-
SHA1
809de147ef849a6690da7cb4a9af8d2bf8f2820b
-
SHA256
e5936e7fcbfc65fdd89d15f767792e86e347df8f0102fff19456a2b344b7334f
-
SHA512
a814670afb5c5f32e2fffba1aa3a0083408446301835d11aa01a75545a05d6e4521e64a61820eabc7829e245651b8ad84ca98767ab846b2186c95b3e014a2ff4
-
SSDEEP
24576:WgMEMOczkzcoFtg3Vakc2hGWvETCTAjPC/SqfZzdaYJRTZQIqmIMyg9VTkpb76uk:AEvcetZavETIA7FkUYJStMyMpy7SN
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-