General
-
Target
Cloudware.exe
-
Size
297KB
-
Sample
240822-ajpfkasbpp
-
MD5
0bf0db39b67c5e2c2568032644fb3b19
-
SHA1
f37d67f69a49413c445fba5d5f856c01838fa47b
-
SHA256
9e734987ac3f35994c15a092409087db7de9fb312d6f557c7f485a856e083fed
-
SHA512
82bf0626515458cd1a39db870f7c73011060b50d12f26fb696b6cfd4d55f9c30cf7c13e59d57c4c537f1b22fbbc49eb46a32134f473ad85802b5fb443cee58e3
-
SSDEEP
6144:0lqrZuknt47WpkGXgTyObsHTTxF4wA7Se5ipWLZ0MLdcFCdYvJyL28yi0uuhb9jw:27smszTxF4wA9hLZViQYvJs28yVuuhbG
Static task
static1
Malware Config
Targets
-
-
Target
Cloudware.exe
-
Size
297KB
-
MD5
0bf0db39b67c5e2c2568032644fb3b19
-
SHA1
f37d67f69a49413c445fba5d5f856c01838fa47b
-
SHA256
9e734987ac3f35994c15a092409087db7de9fb312d6f557c7f485a856e083fed
-
SHA512
82bf0626515458cd1a39db870f7c73011060b50d12f26fb696b6cfd4d55f9c30cf7c13e59d57c4c537f1b22fbbc49eb46a32134f473ad85802b5fb443cee58e3
-
SSDEEP
6144:0lqrZuknt47WpkGXgTyObsHTTxF4wA7Se5ipWLZ0MLdcFCdYvJyL28yi0uuhb9jw:27smszTxF4wA9hLZViQYvJs28yVuuhbG
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-