General
-
Target
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712
-
Size
4.4MB
-
Sample
221123-vt4y8ach8s
-
MD5
b6bae793c4ff24f627908b895fd3f2f2
-
SHA1
3441c797050e4670b7b616d7d204c39e6fe1bb83
-
SHA256
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712
-
SHA512
986afc3605c70341c4d5e3d51f1fc2d74fffcdd03abba24f08a6e1140ea052aec35580c59913ab2d9c9e62bcde7c23d7bbde214beebcb7c5f8da27de4ee1dfda
-
SSDEEP
98304:5+DyuHpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP3Q9OK:kDRdjjqPdDsDbsU0akJyxL405+fiX
Behavioral task
behavioral1
Sample
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712
-
Size
4.4MB
-
MD5
b6bae793c4ff24f627908b895fd3f2f2
-
SHA1
3441c797050e4670b7b616d7d204c39e6fe1bb83
-
SHA256
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712
-
SHA512
986afc3605c70341c4d5e3d51f1fc2d74fffcdd03abba24f08a6e1140ea052aec35580c59913ab2d9c9e62bcde7c23d7bbde214beebcb7c5f8da27de4ee1dfda
-
SSDEEP
98304:5+DyuHpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP3Q9OK:kDRdjjqPdDsDbsU0akJyxL405+fiX
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-