General
-
Target
tmp
-
Size
3.0MB
-
Sample
220823-xx2pdabdb4
-
MD5
c78c87211562343987baad10eeb70f4a
-
SHA1
c879b72ee37eac505d6875882e829865f2e542a7
-
SHA256
20123269b48e6fc150b726295747d0dc9c952b1b0d6d035cb115bbf2e4c249dc
-
SHA512
48c244c6bc207e030fb2dd62eb96d5499cbd083cd35db01c30ae64809426ad93bbdfd60a7fd355b98092adf3fa838ac33d5fa37a7aaafbf837e281ab5f2f0348
-
SSDEEP
49152:Y6ERSDB2MA069+8Q1J5o7bovw8Fmkzx1SwSEw8TcbOmmfmJ/o78h948MEGqW6wg5:gEy6Wcmkzx88Tcfm+68h9eE9CS
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
tmp
-
Size
3.0MB
-
MD5
c78c87211562343987baad10eeb70f4a
-
SHA1
c879b72ee37eac505d6875882e829865f2e542a7
-
SHA256
20123269b48e6fc150b726295747d0dc9c952b1b0d6d035cb115bbf2e4c249dc
-
SHA512
48c244c6bc207e030fb2dd62eb96d5499cbd083cd35db01c30ae64809426ad93bbdfd60a7fd355b98092adf3fa838ac33d5fa37a7aaafbf837e281ab5f2f0348
-
SSDEEP
49152:Y6ERSDB2MA069+8Q1J5o7bovw8Fmkzx1SwSEw8TcbOmmfmJ/o78h948MEGqW6wg5:gEy6Wcmkzx88Tcfm+68h9eE9CS
-
Async RAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-