General
-
Target
5e11eddc26f0c2c322738ed976395cc7
-
Size
5.6MB
-
Sample
220205-tj34hadad3
-
MD5
5e11eddc26f0c2c322738ed976395cc7
-
SHA1
c56b00cfabca05e63f35b4b8ad4d0951a28a9948
-
SHA256
c471a7d1efb47a817be82dabe73c69c038600746fc2945f5434363577d98448b
-
SHA512
1d9b87b5fba512a08145a4f78df8953055bd172b38cbba6e48c499496b1d6397cce54e55e0ea00ff4041515ab44cd6af95833f3d63d8b705b79b901bd9224df2
Static task
static1
Behavioral task
behavioral1
Sample
5e11eddc26f0c2c322738ed976395cc7.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
5e11eddc26f0c2c322738ed976395cc7
-
Size
5.6MB
-
MD5
5e11eddc26f0c2c322738ed976395cc7
-
SHA1
c56b00cfabca05e63f35b4b8ad4d0951a28a9948
-
SHA256
c471a7d1efb47a817be82dabe73c69c038600746fc2945f5434363577d98448b
-
SHA512
1d9b87b5fba512a08145a4f78df8953055bd172b38cbba6e48c499496b1d6397cce54e55e0ea00ff4041515ab44cd6af95833f3d63d8b705b79b901bd9224df2
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-