General
-
Target
e7ccc45b46412eaa8ab40a9c2b9a747f01233f95975b573c9cb0b74c84350f18.exe
-
Size
3.2MB
-
Sample
240806-r2egra1hlk
-
MD5
df21fddf952be3812953a287d01e70a3
-
SHA1
4d49abb99177d7e5580b1a22f64868314587afcc
-
SHA256
e7ccc45b46412eaa8ab40a9c2b9a747f01233f95975b573c9cb0b74c84350f18
-
SHA512
3771cef7012c658fd56c1893168e3464af9db99a9b5969ff837033d60d8b3d8446931a533b355e01f7b28f4af63c2fa4d95c3658c1782a9880e3bd50584bc36c
-
SSDEEP
49152:ACMY6PV19G7nH4/rkoRNJKNHdupiTmYoZFJW6VEEdrUa7P:ACMY6PV19GjH4/rkeNJQuplTK6Vp
Static task
static1
Behavioral task
behavioral1
Sample
e7ccc45b46412eaa8ab40a9c2b9a747f01233f95975b573c9cb0b74c84350f18.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e7ccc45b46412eaa8ab40a9c2b9a747f01233f95975b573c9cb0b74c84350f18.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e7ccc45b46412eaa8ab40a9c2b9a747f01233f95975b573c9cb0b74c84350f18.exe
-
Size
3.2MB
-
MD5
df21fddf952be3812953a287d01e70a3
-
SHA1
4d49abb99177d7e5580b1a22f64868314587afcc
-
SHA256
e7ccc45b46412eaa8ab40a9c2b9a747f01233f95975b573c9cb0b74c84350f18
-
SHA512
3771cef7012c658fd56c1893168e3464af9db99a9b5969ff837033d60d8b3d8446931a533b355e01f7b28f4af63c2fa4d95c3658c1782a9880e3bd50584bc36c
-
SSDEEP
49152:ACMY6PV19G7nH4/rkoRNJKNHdupiTmYoZFJW6VEEdrUa7P:ACMY6PV19GjH4/rkeNJQuplTK6Vp
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2