General
-
Target
CowabungaLite.exe
-
Size
1.6MB
-
Sample
241002-1q36eayfqr
-
MD5
d6bbe9dafd2eb186b22d00ea70d8631e
-
SHA1
09dd6d51844fd854e50cbe7fc10fae80ea2aa911
-
SHA256
07b712079547d394a8f6e6e30fce99fa6dded98135d1529aaca062220a0b1cdf
-
SHA512
85474bb17ec1887d4769819ad9685cfca4d2d900b8e5ece9cc70d3888c36816fa225863aa7b5f0fd137339faa884b8b8791a209d3957cf774bce02bf2cd31248
-
SSDEEP
24576:/C83r12mGC35Fngc2AW11HCqryl7BqbpSqlBbaTr8q:/C83r4mxxgc25jzrv7aTr8q
Static task
static1
Behavioral task
behavioral1
Sample
CowabungaLite.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
CowabungaLite.exe
-
Size
1.6MB
-
MD5
d6bbe9dafd2eb186b22d00ea70d8631e
-
SHA1
09dd6d51844fd854e50cbe7fc10fae80ea2aa911
-
SHA256
07b712079547d394a8f6e6e30fce99fa6dded98135d1529aaca062220a0b1cdf
-
SHA512
85474bb17ec1887d4769819ad9685cfca4d2d900b8e5ece9cc70d3888c36816fa225863aa7b5f0fd137339faa884b8b8791a209d3957cf774bce02bf2cd31248
-
SSDEEP
24576:/C83r12mGC35Fngc2AW11HCqryl7BqbpSqlBbaTr8q:/C83r4mxxgc25jzrv7aTr8q
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-