General
-
Target
b45668e08c03024f2432ff332c319131.exe
-
Size
3.4MB
-
Sample
241103-hbbhqsxfrl
-
MD5
b45668e08c03024f2432ff332c319131
-
SHA1
4bef9109eaeace4107c47858eef2d9d3487e45f0
-
SHA256
4b5a876b1c230b28c0862d5f8158b3657016709855bf3329d8fea6cada3adbfe
-
SHA512
538c8471fc0313e68885d4d09140ec3e3374af3464af626195b6387a67b9bae9c3c9fd369d9dc7965decc182d13e8bbf95b4cf96b5ffc78af5d7904d59325bbc
-
SSDEEP
98304:MHKnK7qkC+8TMGHgWnvLBQ0YXpS3KZFc6LUARABDgAj:MqKYx9zu0YpSaZFcJA6BDga
Behavioral task
behavioral1
Sample
b45668e08c03024f2432ff332c319131.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
b45668e08c03024f2432ff332c319131.exe
-
Size
3.4MB
-
MD5
b45668e08c03024f2432ff332c319131
-
SHA1
4bef9109eaeace4107c47858eef2d9d3487e45f0
-
SHA256
4b5a876b1c230b28c0862d5f8158b3657016709855bf3329d8fea6cada3adbfe
-
SHA512
538c8471fc0313e68885d4d09140ec3e3374af3464af626195b6387a67b9bae9c3c9fd369d9dc7965decc182d13e8bbf95b4cf96b5ffc78af5d7904d59325bbc
-
SSDEEP
98304:MHKnK7qkC+8TMGHgWnvLBQ0YXpS3KZFc6LUARABDgAj:MqKYx9zu0YpSaZFcJA6BDga
-
Detects ZharkBot payload
ZharkBot is a botnet written C++.
-
Zharkbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-