General
-
Target
aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918
-
Size
5.9MB
-
Sample
220802-p3gx6agbdk
-
MD5
0584dab798512e3053948814accbb6f9
-
SHA1
082ad7c7d350757e107841aa77402fbef12dd10c
-
SHA256
aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918
-
SHA512
23783cb0cd26b1a257bb57ef4cbb5ff48250159eed176823f027c1cda7b8eb66508e5361e1347bfda02b7b6b34e5fe573bdbfc0c7dd3226a8bfb471ce366d9d8
Behavioral task
behavioral1
Sample
aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918.exe
Resource
win7-20220715-en
Malware Config
Targets
-
-
Target
aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918
-
Size
5.9MB
-
MD5
0584dab798512e3053948814accbb6f9
-
SHA1
082ad7c7d350757e107841aa77402fbef12dd10c
-
SHA256
aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918
-
SHA512
23783cb0cd26b1a257bb57ef4cbb5ff48250159eed176823f027c1cda7b8eb66508e5361e1347bfda02b7b6b34e5fe573bdbfc0c7dd3226a8bfb471ce366d9d8
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-