General
-
Target
loader.exe
-
Size
5.2MB
-
Sample
220201-v3bn2aadb6
-
MD5
fc6f7b81b26442a2ba19d32530a5049a
-
SHA1
bd0689478f7b3f5bf74af443a1b3a9a3d357bd64
-
SHA256
b67222864ebeff001e105045e8e15b67d0483ea3a84bf02775f8aa2029d1ac08
-
SHA512
fb136a02553cc28dfc9bc30b871413525365b22f78a7a0321d87734b6a53fe03b3bc1d8a1697c55af7e1a6a24762b2f40a529b0c9e384174ceae0f69f7da50e9
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
loader.exe
-
Size
5.2MB
-
MD5
fc6f7b81b26442a2ba19d32530a5049a
-
SHA1
bd0689478f7b3f5bf74af443a1b3a9a3d357bd64
-
SHA256
b67222864ebeff001e105045e8e15b67d0483ea3a84bf02775f8aa2029d1ac08
-
SHA512
fb136a02553cc28dfc9bc30b871413525365b22f78a7a0321d87734b6a53fe03b3bc1d8a1697c55af7e1a6a24762b2f40a529b0c9e384174ceae0f69f7da50e9
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-