General
-
Target
64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f
-
Size
2.4MB
-
Sample
240804-dclymsydka
-
MD5
f0fcd34f0b20e4ab5113e0820153589f
-
SHA1
ed78c8645ac97fc72988b002a33d179ec3cdf09b
-
SHA256
64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f
-
SHA512
7d743736e21a62003ff1506e72bd6f46636cffc6236f66653cb990f9d5e774e420534c9e69beb97a457b7d819a4733581542f5111a7b84a91b96d0d5f275c733
-
SSDEEP
49152:4cv0srYX2TOm4paX1shQPF0q5VWy7EeNDzkIiqdCpSCR9mIvFCtUKhF8:4cvRjCaX1shQdPtQAUIiqcpSCR4ItCiK
Static task
static1
Behavioral task
behavioral1
Sample
64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f
-
Size
2.4MB
-
MD5
f0fcd34f0b20e4ab5113e0820153589f
-
SHA1
ed78c8645ac97fc72988b002a33d179ec3cdf09b
-
SHA256
64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f
-
SHA512
7d743736e21a62003ff1506e72bd6f46636cffc6236f66653cb990f9d5e774e420534c9e69beb97a457b7d819a4733581542f5111a7b84a91b96d0d5f275c733
-
SSDEEP
49152:4cv0srYX2TOm4paX1shQPF0q5VWy7EeNDzkIiqdCpSCR9mIvFCtUKhF8:4cvRjCaX1shQdPtQAUIiqcpSCR4ItCiK
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-