General
-
Target
b80de8e69bd67b465b83c2f1808c5c633d9221fcd7458e7409b92e8f6a4d3985
-
Size
5.2MB
-
Sample
220211-flmyeabae8
-
MD5
d3e8aab559e1813c239a3d290108d248
-
SHA1
a509aae06737754bcecdd7982c62d140cedc2702
-
SHA256
b80de8e69bd67b465b83c2f1808c5c633d9221fcd7458e7409b92e8f6a4d3985
-
SHA512
5cc79cbf57551986238485250eced387f84c5155c93574557562a07841498da1ce68eecf06976f38be9727908ae33de0ad65ff88d2a21dbc12b69c581cd31da2
Static task
static1
Behavioral task
behavioral1
Sample
b80de8e69bd67b465b83c2f1808c5c633d9221fcd7458e7409b92e8f6a4d3985.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b80de8e69bd67b465b83c2f1808c5c633d9221fcd7458e7409b92e8f6a4d3985.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
b80de8e69bd67b465b83c2f1808c5c633d9221fcd7458e7409b92e8f6a4d3985
-
Size
5.2MB
-
MD5
d3e8aab559e1813c239a3d290108d248
-
SHA1
a509aae06737754bcecdd7982c62d140cedc2702
-
SHA256
b80de8e69bd67b465b83c2f1808c5c633d9221fcd7458e7409b92e8f6a4d3985
-
SHA512
5cc79cbf57551986238485250eced387f84c5155c93574557562a07841498da1ce68eecf06976f38be9727908ae33de0ad65ff88d2a21dbc12b69c581cd31da2
Score10/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-