General
-
Target
07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564.exe
-
Size
3.1MB
-
Sample
240820-g7rdds1dqm
-
MD5
3990105c69d93c964f6e8bcf6bff7780
-
SHA1
acbbaf0fda02934439a1a734c0eeaaaafb590311
-
SHA256
07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564
-
SHA512
4445ef7d45fc8dd120c90d29d1171fc7ee1307b69fbfed068b374a40813d36020c5110060732ea6c5d0fc58d56d4209b328f40ca866c0dfd59cf996ace7b093d
-
SSDEEP
98304:jn287iOEfo/qHfekoiAhnfkirGDR4Gumu:r7ooefevjnfF6ZU
Behavioral task
behavioral1
Sample
07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564.exe
-
Size
3.1MB
-
MD5
3990105c69d93c964f6e8bcf6bff7780
-
SHA1
acbbaf0fda02934439a1a734c0eeaaaafb590311
-
SHA256
07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564
-
SHA512
4445ef7d45fc8dd120c90d29d1171fc7ee1307b69fbfed068b374a40813d36020c5110060732ea6c5d0fc58d56d4209b328f40ca866c0dfd59cf996ace7b093d
-
SSDEEP
98304:jn287iOEfo/qHfekoiAhnfkirGDR4Gumu:r7ooefevjnfF6ZU
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-