General
-
Target
cb691234a2b71c78e2b8dc385a3a619cedc01cbec7c4eddef5c93ce9261bf50d
-
Size
5.9MB
-
Sample
220802-p2xl8aehd4
-
MD5
cfc12312e1e6b7e6cb2233edd2e2b157
-
SHA1
b1cdda4c80c4a0e132d62d33e53ab092b00b6efd
-
SHA256
cb691234a2b71c78e2b8dc385a3a619cedc01cbec7c4eddef5c93ce9261bf50d
-
SHA512
5bc0a02e6bd54beaad09d7a917f84f8cc30ba7785b6f2a35e8b5f230703e286ab006b41b9121f30ee84327878b2802f9ddb9ec0322808044bc04a768b722f912
Behavioral task
behavioral1
Sample
cb691234a2b71c78e2b8dc385a3a619cedc01cbec7c4eddef5c93ce9261bf50d.exe
Resource
win7-20220718-en
Malware Config
Targets
-
-
Target
cb691234a2b71c78e2b8dc385a3a619cedc01cbec7c4eddef5c93ce9261bf50d
-
Size
5.9MB
-
MD5
cfc12312e1e6b7e6cb2233edd2e2b157
-
SHA1
b1cdda4c80c4a0e132d62d33e53ab092b00b6efd
-
SHA256
cb691234a2b71c78e2b8dc385a3a619cedc01cbec7c4eddef5c93ce9261bf50d
-
SHA512
5bc0a02e6bd54beaad09d7a917f84f8cc30ba7785b6f2a35e8b5f230703e286ab006b41b9121f30ee84327878b2802f9ddb9ec0322808044bc04a768b722f912
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-