General
-
Target
a8ec0f183b387ea059bde91897135ea0c26cfdad82d8c353aee4d6613cf6149a
-
Size
1.8MB
-
Sample
220809-f4w9ssdeeq
-
MD5
cd2e137d82bce4970a5dca9084ca0e9c
-
SHA1
a06d093fe43bfffc0f6308d5aa24baa478430b0b
-
SHA256
a8ec0f183b387ea059bde91897135ea0c26cfdad82d8c353aee4d6613cf6149a
-
SHA512
35331eb4c4e3e8fec941b0ef06a31e9e84d0534c56ded85c6cf65a8c8f096a686acb2b04260059e72669bdb32d2ffd510b2c3cfb3a368f177d3709c80d51da14
Static task
static1
Malware Config
Targets
-
-
Target
a8ec0f183b387ea059bde91897135ea0c26cfdad82d8c353aee4d6613cf6149a
-
Size
1.8MB
-
MD5
cd2e137d82bce4970a5dca9084ca0e9c
-
SHA1
a06d093fe43bfffc0f6308d5aa24baa478430b0b
-
SHA256
a8ec0f183b387ea059bde91897135ea0c26cfdad82d8c353aee4d6613cf6149a
-
SHA512
35331eb4c4e3e8fec941b0ef06a31e9e84d0534c56ded85c6cf65a8c8f096a686acb2b04260059e72669bdb32d2ffd510b2c3cfb3a368f177d3709c80d51da14
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-