General
-
Target
69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2
-
Size
2.4MB
-
Sample
220521-x39xyachb4
-
MD5
defcde0fc4d0bcabd6cc08593ac180bd
-
SHA1
edbc8ed017837cb273842ca47e6ded4616ebd24f
-
SHA256
69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2
-
SHA512
8e5e1137de7bfcb4c0962f82aab6c76d6e92c233337c85c03afe7ad72ffdd3db79a46be44b58bdba28c13b75299dcf839a0b96366c4a0d188c13bbe57e5c9885
Static task
static1
Behavioral task
behavioral1
Sample
69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2.dll
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2
-
Size
2.4MB
-
MD5
defcde0fc4d0bcabd6cc08593ac180bd
-
SHA1
edbc8ed017837cb273842ca47e6ded4616ebd24f
-
SHA256
69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2
-
SHA512
8e5e1137de7bfcb4c0962f82aab6c76d6e92c233337c85c03afe7ad72ffdd3db79a46be44b58bdba28c13b75299dcf839a0b96366c4a0d188c13bbe57e5c9885
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-