General
-
Target
1fa23960d2dce1bbad5ab761d0b65f62d9a71d20d7e180f73b0b374398a6296e
-
Size
5.6MB
-
Sample
211206-v3r11seffj
-
MD5
db4cebbdab4486e191a77c10bc58ae27
-
SHA1
918a3696511f9da24da0fe022ac9b3190fe87fda
-
SHA256
1fa23960d2dce1bbad5ab761d0b65f62d9a71d20d7e180f73b0b374398a6296e
-
SHA512
9fa26bad15faae4c656861691f32dae88e2793dd154da1e1fb29c0e55234c4b444a4d3af767e6ec541c5bb050808213c9859eb6779d2adc73db8f769968a4210
Static task
static1
Malware Config
Targets
-
-
Target
1fa23960d2dce1bbad5ab761d0b65f62d9a71d20d7e180f73b0b374398a6296e
-
Size
5.6MB
-
MD5
db4cebbdab4486e191a77c10bc58ae27
-
SHA1
918a3696511f9da24da0fe022ac9b3190fe87fda
-
SHA256
1fa23960d2dce1bbad5ab761d0b65f62d9a71d20d7e180f73b0b374398a6296e
-
SHA512
9fa26bad15faae4c656861691f32dae88e2793dd154da1e1fb29c0e55234c4b444a4d3af767e6ec541c5bb050808213c9859eb6779d2adc73db8f769968a4210
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-