General
-
Target
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c
-
Size
1.8MB
-
Sample
220809-f293wadedn
-
MD5
82847af8b38ffd417e272c3de40e2329
-
SHA1
4b6be6a36ff45f59ca97a4eeb05a8123035e9cf8
-
SHA256
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c
-
SHA512
9030cdc2824b606f895fe3c0155745b862ef8eeb2da09d3b8e08b947488ceaa1a7d2cdf6321b0fcf57d1439c0523582d60657312b3fc8d1d4897a99d541ea763
Static task
static1
Malware Config
Targets
-
-
Target
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c
-
Size
1.8MB
-
MD5
82847af8b38ffd417e272c3de40e2329
-
SHA1
4b6be6a36ff45f59ca97a4eeb05a8123035e9cf8
-
SHA256
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c
-
SHA512
9030cdc2824b606f895fe3c0155745b862ef8eeb2da09d3b8e08b947488ceaa1a7d2cdf6321b0fcf57d1439c0523582d60657312b3fc8d1d4897a99d541ea763
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-