General
-
Target
Trusteer.zip
-
Size
3.3MB
-
Sample
240901-1dp31sshna
-
MD5
e901a3d2239142f7a3a5d93320ffcff1
-
SHA1
c33eac1862db3611730d62c688430c235feaefe4
-
SHA256
b3b3a4a9ac1cc6715d8c875ac34f92708d0b9f91104b793768ed90baa57c97d0
-
SHA512
2e9187e3af506e6311e284fe2a26b5711e7c99425e80a3e1dd7fdb435ba9297298988a715bafc950cfe7071d035f54ed36b2cbfeb17e201eb3a3620e256a582f
-
SSDEEP
98304:YcS/hHOGLVlQtM2xOxWwyvfOUe+sz2oIjx2hA2Z1IrJMy:YvZdswW1mU7sz2oAG0rJMy
Static task
static1
Behavioral task
behavioral1
Sample
Trusteer.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
Trusteer.exe
-
Size
3.3MB
-
MD5
30cb49e14aa0f3247110df5dc1a1690b
-
SHA1
84521809033b25b01338e3087881d4c37b4d0faa
-
SHA256
2ad801c4a4f232b02c940858d69c3d3608c6df1606b73c76494e1d7d0d30e761
-
SHA512
c206045d0c2ba0dfc773bb5b41db0802127d86d521b6fe41523d63e59b79a2657dd960b3ca1dc1be31298279d920f3080a5e72803cd11fe261b32e08cd3577e9
-
SSDEEP
49152:p7RUQh1V1fO/9DA0q3i9aLrsvHyR15U8dJAsgWpyTulz9b9H5vDCjeMeZi7uax:p711TMeS92r1155A/0ysPZvej3
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-