General
-
Target
Acunetix Premium Activation Tool.exe
-
Size
6.2MB
-
Sample
220720-a4d6bshha2
-
MD5
0537e883d76c11df03adfe93ae6d5500
-
SHA1
f3090d8e68e8c35ed7e35a862759e3f444f0320c
-
SHA256
24354524397121389a297ac8a7c1af8b7d3fd9f9caf6f21975557b6d0e531091
-
SHA512
1f44e1acb1a1b66ca988f8233f10fc531c1f71303856ac9e442cc7f950894b8da37e40a89c99bd8cf1f27a85148033ef8bc1068060d6e5a052e60e64010f8380
Behavioral task
behavioral1
Sample
Acunetix Premium Activation Tool.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Acunetix Premium Activation Tool.exe
Resource
win10v2004-20220718-en
Malware Config
Targets
-
-
Target
Acunetix Premium Activation Tool.exe
-
Size
6.2MB
-
MD5
0537e883d76c11df03adfe93ae6d5500
-
SHA1
f3090d8e68e8c35ed7e35a862759e3f444f0320c
-
SHA256
24354524397121389a297ac8a7c1af8b7d3fd9f9caf6f21975557b6d0e531091
-
SHA512
1f44e1acb1a1b66ca988f8233f10fc531c1f71303856ac9e442cc7f950894b8da37e40a89c99bd8cf1f27a85148033ef8bc1068060d6e5a052e60e64010f8380
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-