General
-
Target
biamou.exe
-
Size
3.3MB
-
Sample
220119-259r6sdhen
-
MD5
4da9953b63df9701effcbdabf0225a47
-
SHA1
c6b57281d09a692e818b40c56f1ef08c8a4221fb
-
SHA256
29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439
-
SHA512
2e6e436dfad558c6f52db26bfa510d61ed741c8f3c4d24f755682f8f9d95662a2c2c7bffc0c518eedc9754f3f75b5e8184e6b76b34a9a7e84e007cb51d976d13
Static task
static1
Behavioral task
behavioral1
Sample
biamou.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
biamou.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
biamou.exe
-
Size
3.3MB
-
MD5
4da9953b63df9701effcbdabf0225a47
-
SHA1
c6b57281d09a692e818b40c56f1ef08c8a4221fb
-
SHA256
29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439
-
SHA512
2e6e436dfad558c6f52db26bfa510d61ed741c8f3c4d24f755682f8f9d95662a2c2c7bffc0c518eedc9754f3f75b5e8184e6b76b34a9a7e84e007cb51d976d13
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-