General
-
Target
3b347a4641e8553c4ecbee8e6d86c32311cd9348d61eb55929aae076e82f96c3
-
Size
4.8MB
-
Sample
210928-n7pm5abgh9
-
MD5
c04496520501bc6a3b3f0b7f5f875a32
-
SHA1
49e280e408a6df27295abf3d504003cbceeb00d8
-
SHA256
3b347a4641e8553c4ecbee8e6d86c32311cd9348d61eb55929aae076e82f96c3
-
SHA512
de333be3cd173a96579e95410fe92b8a4e5976b80451601bcf300eb2f3405be91983edb83881dd7f1d02aef6c0a5cadc00850c0536b2254ad710808d5cf183eb
Static task
static1
Malware Config
Targets
-
-
Target
3b347a4641e8553c4ecbee8e6d86c32311cd9348d61eb55929aae076e82f96c3
-
Size
4.8MB
-
MD5
c04496520501bc6a3b3f0b7f5f875a32
-
SHA1
49e280e408a6df27295abf3d504003cbceeb00d8
-
SHA256
3b347a4641e8553c4ecbee8e6d86c32311cd9348d61eb55929aae076e82f96c3
-
SHA512
de333be3cd173a96579e95410fe92b8a4e5976b80451601bcf300eb2f3405be91983edb83881dd7f1d02aef6c0a5cadc00850c0536b2254ad710808d5cf183eb
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-