General
-
Target
31f20e519939289560661eb6fe04be9f73bbf17c3c22a9b8087c59e60bae8873
-
Size
2.8MB
-
Sample
220802-v4jq2ahda6
-
MD5
56b6e17006b25ce5586d1441a2db7cc8
-
SHA1
65163f385f5180a1dee189044d1df296af61ce70
-
SHA256
31f20e519939289560661eb6fe04be9f73bbf17c3c22a9b8087c59e60bae8873
-
SHA512
171fb597dcffe783024452460fad8e37af7fd87ab003674917085a468fddba9e1a9436d2a8b318420602705d44061153a8f18c79380a9df5f360f150af1d77f5
Malware Config
Targets
-
-
Target
31f20e519939289560661eb6fe04be9f73bbf17c3c22a9b8087c59e60bae8873
-
Size
2.8MB
-
MD5
56b6e17006b25ce5586d1441a2db7cc8
-
SHA1
65163f385f5180a1dee189044d1df296af61ce70
-
SHA256
31f20e519939289560661eb6fe04be9f73bbf17c3c22a9b8087c59e60bae8873
-
SHA512
171fb597dcffe783024452460fad8e37af7fd87ab003674917085a468fddba9e1a9436d2a8b318420602705d44061153a8f18c79380a9df5f360f150af1d77f5
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-