General
-
Target
random.exe
-
Size
1.6MB
-
Sample
241230-nc3lhaxpgv
-
MD5
27998d2440b5a856eca1795eabb8fa23
-
SHA1
62d063990224278662ebd3e54742c09c0ed74751
-
SHA256
bb98ac0c1ef756eee54726001008f52b498dd3c8575e190083674f52f33f3d9f
-
SHA512
814eab7721f0c0fde983bf3956094847a1ed79e422ad8a6559a4a4266c9178d996b5341be6cb20c2e62446001f89222e2d1f7ad7656eb793307ad9087b57a9bd
-
SSDEEP
49152:ACLkDxtWk5WtTj/JuiLWbUT5B+xLNNXTjbT+:RLkDxwk63/JVLqMS1fy
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
random.exe
-
Size
1.6MB
-
MD5
27998d2440b5a856eca1795eabb8fa23
-
SHA1
62d063990224278662ebd3e54742c09c0ed74751
-
SHA256
bb98ac0c1ef756eee54726001008f52b498dd3c8575e190083674f52f33f3d9f
-
SHA512
814eab7721f0c0fde983bf3956094847a1ed79e422ad8a6559a4a4266c9178d996b5341be6cb20c2e62446001f89222e2d1f7ad7656eb793307ad9087b57a9bd
-
SSDEEP
49152:ACLkDxtWk5WtTj/JuiLWbUT5B+xLNNXTjbT+:RLkDxwk63/JVLqMS1fy
Score10/10-
Detect Poverty Stealer Payload
-
Povertystealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1