General
-
Target
32bits.zip
-
Size
7.0MB
-
Sample
220718-ss2flahbfp
-
MD5
2a921b291a8cceca101b70ec97db2e60
-
SHA1
dde4bb204ec730bbc02749189f73b7d0809eb53f
-
SHA256
63c5aa3e26fdc571f328f9c8a5e2c518b6f0611110270eb4b224ee99dfe0c416
-
SHA512
a0bdaf91b4b7a6b761a7a3734e4678a15478413ebca783de0a2a8a398220616b551f13609a26a5f5fe6339782265e8421b593c8c403b11b834a9374220fd6e94
Behavioral task
behavioral1
Sample
gcpfqzsczq.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
gcpfqzsczq.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
ms9s539qhd0628mgfggg.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
ms9s539qhd0628mgfggg.exe
Resource
win10v2004-20220718-en
Malware Config
Targets
-
-
Target
gcpfqzsczq.dop
-
Size
6.8MB
-
MD5
cb0e540176159268be4986459091576a
-
SHA1
c512c14e8a2afb15636e7b4c6f30284646b8d456
-
SHA256
fbe44a3401b91f4fa23f2df40e6844931bfc1e8931fefcf301b786788b44a6f4
-
SHA512
a04fc5b10b46bd2cec4ce3ec48b29ca87e3137a3f5e2d3575d18a6282c98a6c9e9e7c9316494fbeb1a4e30ce24842d41c074c3d4c3c122e0378f8259b25a4b1a
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
ms9s539qhd0628mgfggg
-
Size
884KB
-
MD5
4685811c853ceaebc991c3a8406694bf
-
SHA1
9cd382eb91bfea5782dd09f589a31b47c2c2b53e
-
SHA256
3242e0a736ef8ac90430a9f272ff30a81e2afc146fcb84a25c6e56e8192791e4
-
SHA512
a504fbca674f15d8964ebc6fac11d9431d700ca22736c00d5bb1e51551b0d2b9e4b2b6824bdf1a778111a0ba8d2601eada2f726b9ec7a9cfa5a53fd43c235b46
Score1/10 -