General
-
Target
94141aec3dfffe3c6a1d3576cb17a6d989ef4404554e07ad6ae0b6d5ec584641
-
Size
6.8MB
-
Sample
220630-3xgxvsege4
-
MD5
6dfbff479749aa55936778d5cf94ec1f
-
SHA1
bbfcd9bc7d4bf178980b3ae2e434a77cd2447401
-
SHA256
94141aec3dfffe3c6a1d3576cb17a6d989ef4404554e07ad6ae0b6d5ec584641
-
SHA512
edf2b80a21d1b61ea4d0b9f4522020bfb573c22004181b84cd904b6296466d21e85649aae92bef2766fe3e983852ee0117944e238a67fe817dc53efd006ddf93
Static task
static1
Behavioral task
behavioral1
Sample
94141aec3dfffe3c6a1d3576cb17a6d989ef4404554e07ad6ae0b6d5ec584641.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
94141aec3dfffe3c6a1d3576cb17a6d989ef4404554e07ad6ae0b6d5ec584641
-
Size
6.8MB
-
MD5
6dfbff479749aa55936778d5cf94ec1f
-
SHA1
bbfcd9bc7d4bf178980b3ae2e434a77cd2447401
-
SHA256
94141aec3dfffe3c6a1d3576cb17a6d989ef4404554e07ad6ae0b6d5ec584641
-
SHA512
edf2b80a21d1b61ea4d0b9f4522020bfb573c22004181b84cd904b6296466d21e85649aae92bef2766fe3e983852ee0117944e238a67fe817dc53efd006ddf93
-
Shurk Stealer Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-