General
-
Target
adcea79b5f009bcf143d1a0acfa03e200cba2cbf38ea5eb69c295f6c87bcde25.exe
-
Size
3.0MB
-
Sample
240821-cknxjayerr
-
MD5
b54aec57135e09a7509d5bd1a34ad771
-
SHA1
505a83add58ddd23e3abb430e48a96b53591af56
-
SHA256
adcea79b5f009bcf143d1a0acfa03e200cba2cbf38ea5eb69c295f6c87bcde25
-
SHA512
6da058b744f7cc400f8a4a127ed3cc29454c1d38827b9955e1391c37bb08ef4980250856c5636a4c5ef0230434faa0c70f914f7fa8b9948239592ce50221e87f
-
SSDEEP
98304:fghNWhHD8muqAidJYOHD07fLbqDGwy+lppE:ohER5uqAsY6oXqDGw7lpa
Behavioral task
behavioral1
Sample
adcea79b5f009bcf143d1a0acfa03e200cba2cbf38ea5eb69c295f6c87bcde25.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
adcea79b5f009bcf143d1a0acfa03e200cba2cbf38ea5eb69c295f6c87bcde25.exe
-
Size
3.0MB
-
MD5
b54aec57135e09a7509d5bd1a34ad771
-
SHA1
505a83add58ddd23e3abb430e48a96b53591af56
-
SHA256
adcea79b5f009bcf143d1a0acfa03e200cba2cbf38ea5eb69c295f6c87bcde25
-
SHA512
6da058b744f7cc400f8a4a127ed3cc29454c1d38827b9955e1391c37bb08ef4980250856c5636a4c5ef0230434faa0c70f914f7fa8b9948239592ce50221e87f
-
SSDEEP
98304:fghNWhHD8muqAidJYOHD07fLbqDGwy+lppE:ohER5uqAsY6oXqDGw7lpa
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-