General
-
Target
d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e
-
Size
10.2MB
-
Sample
220630-ynrngsced4
-
MD5
f29a86fa16fc8c55acbfabe4fb388743
-
SHA1
e0e74d9f4454df636fd2fec10561af4fd5412353
-
SHA256
d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e
-
SHA512
8e419c8ab1586151fa174e65e2b2505a499ab24a303a655d900619ebaaa24528f058409e04961b6bde2d8c131155f28c3d885fe46a148726467408475b806ebb
Behavioral task
behavioral1
Sample
d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e
-
Size
10.2MB
-
MD5
f29a86fa16fc8c55acbfabe4fb388743
-
SHA1
e0e74d9f4454df636fd2fec10561af4fd5412353
-
SHA256
d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e
-
SHA512
8e419c8ab1586151fa174e65e2b2505a499ab24a303a655d900619ebaaa24528f058409e04961b6bde2d8c131155f28c3d885fe46a148726467408475b806ebb
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner Payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-