General
-
Target
43d66e78f5334cc183e22aa29c64a9fdf4356e5a0c5052489fd7edc127460a6c
-
Size
6.3MB
-
Sample
220127-n9dzeaceh6
-
MD5
7e80c2ae5587b824d8230e782089e86b
-
SHA1
90f0912a29b9cc7a55bd4b561e1a574e005cecf6
-
SHA256
43d66e78f5334cc183e22aa29c64a9fdf4356e5a0c5052489fd7edc127460a6c
-
SHA512
db0e42e94976b9fe4d75a502b0a32f3ec4e6b993de02781ccef11a4aebc0fb0cedf1d43cd2280faa186edb66ff869f2b883f091889958625081b1a97cde5203a
Static task
static1
Behavioral task
behavioral1
Sample
43d66e78f5334cc183e22aa29c64a9fdf4356e5a0c5052489fd7edc127460a6c.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
43d66e78f5334cc183e22aa29c64a9fdf4356e5a0c5052489fd7edc127460a6c
-
Size
6.3MB
-
MD5
7e80c2ae5587b824d8230e782089e86b
-
SHA1
90f0912a29b9cc7a55bd4b561e1a574e005cecf6
-
SHA256
43d66e78f5334cc183e22aa29c64a9fdf4356e5a0c5052489fd7edc127460a6c
-
SHA512
db0e42e94976b9fe4d75a502b0a32f3ec4e6b993de02781ccef11a4aebc0fb0cedf1d43cd2280faa186edb66ff869f2b883f091889958625081b1a97cde5203a
Score10/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-