General
-
Target
d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a
-
Size
2.6MB
-
Sample
220111-mr7y4afecq
-
MD5
9fc7af6629c940c285a28f316a4039f3
-
SHA1
24bfdfc77cfe9f744be469303233a499c8382bf1
-
SHA256
d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a
-
SHA512
ed428f4e2f70d4a225630c2ea07b3129194db0f7e0fc1ddadcf914a51ffb00fcbf127e934631f642e72f235d3fb12105d03cb93111e86ac8782244297e4bcd8e
Static task
static1
Malware Config
Targets
-
-
Target
d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a
-
Size
2.6MB
-
MD5
9fc7af6629c940c285a28f316a4039f3
-
SHA1
24bfdfc77cfe9f744be469303233a499c8382bf1
-
SHA256
d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a
-
SHA512
ed428f4e2f70d4a225630c2ea07b3129194db0f7e0fc1ddadcf914a51ffb00fcbf127e934631f642e72f235d3fb12105d03cb93111e86ac8782244297e4bcd8e
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-