General
-
Target
offvers123.exe
-
Size
13.0MB
-
Sample
220912-qypmwaddb2
-
MD5
ba0f60bd614b070125e638aaea4af8b7
-
SHA1
9272904f9ad2fc35bdf989e17aa8b2d494ea0378
-
SHA256
4ee07e70f737fdbbcc499eb6111572f3959fee90810aff565f4acfb865525860
-
SHA512
596d544d61bee3822b98e7eaccfcfe623290d7921049a03902fe334d73e0606ef02c905eab9576fe7ce0961aa9eeff735161c4d66be893190686ffd6f30fe873
-
SSDEEP
393216:C5tOfWdFIezjvrbgMr1TyvzRhyQX2GbC3I9:EkkIePjbgfzLNX
Static task
static1
Malware Config
Targets
-
-
Target
offvers123.exe
-
Size
13.0MB
-
MD5
ba0f60bd614b070125e638aaea4af8b7
-
SHA1
9272904f9ad2fc35bdf989e17aa8b2d494ea0378
-
SHA256
4ee07e70f737fdbbcc499eb6111572f3959fee90810aff565f4acfb865525860
-
SHA512
596d544d61bee3822b98e7eaccfcfe623290d7921049a03902fe334d73e0606ef02c905eab9576fe7ce0961aa9eeff735161c4d66be893190686ffd6f30fe873
-
SSDEEP
393216:C5tOfWdFIezjvrbgMr1TyvzRhyQX2GbC3I9:EkkIePjbgfzLNX
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-