General
-
Target
099a21ed3c029636ab7979495a13f0c9f5b170fd80c78be71b1fa19e17c9c744
-
Size
1.9MB
-
Sample
241109-v9p51axrdx
-
MD5
081a051c0d6033e8e87ecb29b89e2453
-
SHA1
862d6d5b7a71e57344887b46aeff81e52f3d7355
-
SHA256
099a21ed3c029636ab7979495a13f0c9f5b170fd80c78be71b1fa19e17c9c744
-
SHA512
91ef7feedf52f7d4f7249daee6d333396f65aadf14cfada8659f29a451726d85e978cd63666777b078451c92daa6782968cfb185c6efa66077da3f3fc081a2df
-
SSDEEP
49152:hY8W02l7Ung8jt6HefYMIZuAiemwQn1cwjmsMuR+UZHLMW+FSF:htWllWht6NMkmFn16sMU+iHojFq
Behavioral task
behavioral1
Sample
Zeno Zex.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
Zeno Zex.exe
-
Size
1.9MB
-
MD5
40bf9f5997db7c86960bb6dbf019ebd6
-
SHA1
0d7bd4d8cc4eec98dcd4983137f8786baa8b6610
-
SHA256
b94685d8c36817271046244e3a97d0574e06c411917ae4c9e5f9b43a1449679a
-
SHA512
a199d517dd2910b24c52274eb5a7b469332e4139b50741c5730ae2bcd5bbc96cdf8e4ddbb2a8a2c2334e3c4ab02516f9b611899c3b2a82a007d1365e48596fb6
-
SSDEEP
49152:dg7S1CK5GQNm4+Ua+WvGp0452WzKXkGoBUdG4r:Km1W+ba+WI04IWWLoB8Ga
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-