General
-
Target
b56b7a27fd509d39ce2185e0f7c94bca
-
Size
2.7MB
-
Sample
211218-1h7tmafeg3
-
MD5
b56b7a27fd509d39ce2185e0f7c94bca
-
SHA1
af0d4a3a03fed4ab66c756fbe32099136e0c5577
-
SHA256
4f4368e357e407f79326cb4e2f46ee8c264b5fd1b8647ff46a453fae39631f53
-
SHA512
c0895ee55e0b8b1d00a682608780369f0bc5ae9e7731b055091a7dcd6d94f126803be42a1c1ce9fa87cfec7fff63f90892b69471cba6f0ae5b2f7dad34bbe1b5
Static task
static1
Behavioral task
behavioral1
Sample
b56b7a27fd509d39ce2185e0f7c94bca.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
b56b7a27fd509d39ce2185e0f7c94bca
-
Size
2.7MB
-
MD5
b56b7a27fd509d39ce2185e0f7c94bca
-
SHA1
af0d4a3a03fed4ab66c756fbe32099136e0c5577
-
SHA256
4f4368e357e407f79326cb4e2f46ee8c264b5fd1b8647ff46a453fae39631f53
-
SHA512
c0895ee55e0b8b1d00a682608780369f0bc5ae9e7731b055091a7dcd6d94f126803be42a1c1ce9fa87cfec7fff63f90892b69471cba6f0ae5b2f7dad34bbe1b5
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-