General
-
Target
32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2
-
Size
2.7MB
-
Sample
220212-kpqwpaaca8
-
MD5
908cfbc12ebc4d187f8d262b53e8ca3e
-
SHA1
01bcf5796c5a95fd02ec237de3326f09dbd4c12b
-
SHA256
32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2
-
SHA512
e18aaf8bc06dc3b096963228ab7cf2ed652c30efd0d4f441607401849f171866eb59c05446835c0707226d36131ffdf8e0f9d641de8b8427393e7335b73ffdec
Static task
static1
Behavioral task
behavioral1
Sample
32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2
-
Size
2.7MB
-
MD5
908cfbc12ebc4d187f8d262b53e8ca3e
-
SHA1
01bcf5796c5a95fd02ec237de3326f09dbd4c12b
-
SHA256
32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2
-
SHA512
e18aaf8bc06dc3b096963228ab7cf2ed652c30efd0d4f441607401849f171866eb59c05446835c0707226d36131ffdf8e0f9d641de8b8427393e7335b73ffdec
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-