General
-
Target
f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin
-
Size
3.8MB
-
Sample
200721-2ftkressa6
-
MD5
79a7de437dad73c33490fc8dd3f9d6c5
-
SHA1
3ebd89f9bf858ae9f6d460fde0875ef2061c8535
-
SHA256
f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0
-
SHA512
152990cbc3ccf22d08326a2e5f58cb0f8c96f7d5e20a82a90b894061df85cef800b6e26ee325ced9cea468e7f83fee3f6a6277efdb7d95db81f6517e824e0f73
Static task
static1
Behavioral task
behavioral1
Sample
f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin.exe
Resource
win7v200430
Malware Config
Targets
-
-
Target
f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin
-
Size
3.8MB
-
MD5
79a7de437dad73c33490fc8dd3f9d6c5
-
SHA1
3ebd89f9bf858ae9f6d460fde0875ef2061c8535
-
SHA256
f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0
-
SHA512
152990cbc3ccf22d08326a2e5f58cb0f8c96f7d5e20a82a90b894061df85cef800b6e26ee325ced9cea468e7f83fee3f6a6277efdb7d95db81f6517e824e0f73
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-