General
-
Target
setup.exe
-
Size
146KB
-
Sample
241118-vw8eessakk
-
MD5
15ac5ad1c4c1a483da074a5fad3f4b0c
-
SHA1
144d87b60d42a0b5d527b3cab8cd7ad60d3c468c
-
SHA256
d87bc6b532f94b6023c55bb38f96f0472857bb7742db4199704386bf8f533fb9
-
SHA512
4dacb7551ccc17cb552ad12a0308f2d0c6ff3a27e5a079767b094db7daf54dbf2886273f7da6cd84d73d33a861aae8f1b35d0f52b3ee1db0913854181411a4de
-
SSDEEP
3072:4ESJuC4+3BrDDl8DC+1iJLU0YFzkEDN3BtGc/aFRsO8Jw:+uCBRrDZN+1i2xCmRwc/a7j
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
setup.exe
-
Size
146KB
-
MD5
15ac5ad1c4c1a483da074a5fad3f4b0c
-
SHA1
144d87b60d42a0b5d527b3cab8cd7ad60d3c468c
-
SHA256
d87bc6b532f94b6023c55bb38f96f0472857bb7742db4199704386bf8f533fb9
-
SHA512
4dacb7551ccc17cb552ad12a0308f2d0c6ff3a27e5a079767b094db7daf54dbf2886273f7da6cd84d73d33a861aae8f1b35d0f52b3ee1db0913854181411a4de
-
SSDEEP
3072:4ESJuC4+3BrDDl8DC+1iJLU0YFzkEDN3BtGc/aFRsO8Jw:+uCBRrDZN+1i2xCmRwc/a7j
-
Venomrat family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-