General
-
Target
86d758c6abd61b00327d4325bc91833b
-
Size
3.5MB
-
Sample
240201-n681dacgg3
-
MD5
86d758c6abd61b00327d4325bc91833b
-
SHA1
8d732d3a96b61bef222a9852545c1f49eedbcb11
-
SHA256
a94ffe5bd707888c7a28014793d9e529b77ac4597b7ebb4eabc7cc188407a37d
-
SHA512
6294d6da0a93f49e3cd83b8e0e65cd2174d4cdcdcc4f1dd85d05c2ab45901427bf2722d6fcf6af3369866bf96862019cbe8112dddf63ad0364752db99dc30b64
-
SSDEEP
98304:VK6BDjBRP/QsJ2WaYG0rH/ZGKpyjszQYb/qC:VK6ljBd/JghQbZTkjnUqC
Static task
static1
Behavioral task
behavioral1
Sample
86d758c6abd61b00327d4325bc91833b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86d758c6abd61b00327d4325bc91833b.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
86d758c6abd61b00327d4325bc91833b
-
Size
3.5MB
-
MD5
86d758c6abd61b00327d4325bc91833b
-
SHA1
8d732d3a96b61bef222a9852545c1f49eedbcb11
-
SHA256
a94ffe5bd707888c7a28014793d9e529b77ac4597b7ebb4eabc7cc188407a37d
-
SHA512
6294d6da0a93f49e3cd83b8e0e65cd2174d4cdcdcc4f1dd85d05c2ab45901427bf2722d6fcf6af3369866bf96862019cbe8112dddf63ad0364752db99dc30b64
-
SSDEEP
98304:VK6BDjBRP/QsJ2WaYG0rH/ZGKpyjszQYb/qC:VK6ljBd/JghQbZTkjnUqC
Score10/10-
Panda Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-