General
-
Target
4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324
-
Size
3.4MB
-
Sample
220805-l98snsabh8
-
MD5
b67da452eabdb5202468322d11b07c01
-
SHA1
698f6779381714ec3c7d19840da6a679da918e84
-
SHA256
4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324
-
SHA512
2d4547769f16537ca5e9a9c1beba7ee7047594b1789a25223855a9f86fe1eafdf005d69c57b63f5ff65bbad12052226782e5d558323590057d4eac2f90091205
Behavioral task
behavioral1
Sample
4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324.exe
Resource
win7-20220715-en
Malware Config
Targets
-
-
Target
4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324
-
Size
3.4MB
-
MD5
b67da452eabdb5202468322d11b07c01
-
SHA1
698f6779381714ec3c7d19840da6a679da918e84
-
SHA256
4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324
-
SHA512
2d4547769f16537ca5e9a9c1beba7ee7047594b1789a25223855a9f86fe1eafdf005d69c57b63f5ff65bbad12052226782e5d558323590057d4eac2f90091205
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-