General
-
Target
9fbdc3eb3cdb9d01986fe1c7391c35f3
-
Size
14.9MB
-
Sample
220714-fs6zvshhh5
-
MD5
9fbdc3eb3cdb9d01986fe1c7391c35f3
-
SHA1
f8f72269cc647c6cad855fbc13aba400ef74d0d8
-
SHA256
b4736b94230d53ab0aa384868b7b00fa07427e18b9e8171f7b48c46ef2481c58
-
SHA512
a0921088358285f5c71e14c801fe6ba2960bae71ceb4cbba7f1e81ebd581efce4c7d68f59e7ebf21d41246936809f1fd6a5f5ceeacc73e5c818a8cddf9b45e11
Static task
static1
Behavioral task
behavioral1
Sample
9fbdc3eb3cdb9d01986fe1c7391c35f3.dll
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
9fbdc3eb3cdb9d01986fe1c7391c35f3
-
Size
14.9MB
-
MD5
9fbdc3eb3cdb9d01986fe1c7391c35f3
-
SHA1
f8f72269cc647c6cad855fbc13aba400ef74d0d8
-
SHA256
b4736b94230d53ab0aa384868b7b00fa07427e18b9e8171f7b48c46ef2481c58
-
SHA512
a0921088358285f5c71e14c801fe6ba2960bae71ceb4cbba7f1e81ebd581efce4c7d68f59e7ebf21d41246936809f1fd6a5f5ceeacc73e5c818a8cddf9b45e11
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-