General
-
Target
RFQ.xll
-
Size
728KB
-
Sample
220719-wme7ysfgg3
-
MD5
8256cc1447b4199fbe35f627cffd3ae9
-
SHA1
51540c8084f61ae5a9aafeb6b681b74cddc52cec
-
SHA256
7ba2a7701e6a8519f6c61142c669c4f5da01fe09b1bb789078b888da2a832be9
-
SHA512
67e1231aec5b9c81f04e7f90a6d60d5ad2b83301da8fa499c31fea43e4611962b3a0a9dfd41f6aa27f611b3d2035474a2ac0a293266d81b0b30cdd6026d036da
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.xll
Resource
win7-20220718-en
Malware Config
Extracted
Extracted
arkei
Default
Targets
-
-
Target
RFQ.xll
-
Size
728KB
-
MD5
8256cc1447b4199fbe35f627cffd3ae9
-
SHA1
51540c8084f61ae5a9aafeb6b681b74cddc52cec
-
SHA256
7ba2a7701e6a8519f6c61142c669c4f5da01fe09b1bb789078b888da2a832be9
-
SHA512
67e1231aec5b9c81f04e7f90a6d60d5ad2b83301da8fa499c31fea43e4611962b3a0a9dfd41f6aa27f611b3d2035474a2ac0a293266d81b0b30cdd6026d036da
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-