General
-
Target
GrabberBuilder.exe
-
Size
3.4MB
-
Sample
250113-3fwdxssqem
-
MD5
fb7b19adc02c514e4e396b0184fe4d5b
-
SHA1
7067272c1aa7dcb9cbe37699da88e18ddcd4e616
-
SHA256
56f44437618196097836457153108f24370c94cad2f078076e96221797ddff10
-
SHA512
5df96dabef422b22d54a884289b80d028c8cc0d5cf095d032d5126002c04e826090f61ed549d800a28945f7afcbd7c74debcd65948de01b12463127d1750bc40
-
SSDEEP
98304:pcO+IuSn/xejlEvsJyrNyPL3Prc/BJUvju+wp:tZr/2xyUPLYZJU6
Behavioral task
behavioral1
Sample
GrabberBuilder.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
GrabberBuilder.exe
-
Size
3.4MB
-
MD5
fb7b19adc02c514e4e396b0184fe4d5b
-
SHA1
7067272c1aa7dcb9cbe37699da88e18ddcd4e616
-
SHA256
56f44437618196097836457153108f24370c94cad2f078076e96221797ddff10
-
SHA512
5df96dabef422b22d54a884289b80d028c8cc0d5cf095d032d5126002c04e826090f61ed549d800a28945f7afcbd7c74debcd65948de01b12463127d1750bc40
-
SSDEEP
98304:pcO+IuSn/xejlEvsJyrNyPL3Prc/BJUvju+wp:tZr/2xyUPLYZJU6
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-