General
-
Target
54bb061c9e20e11d604d8cc37f528ee4532837f16e4e690cd8afbcc9c70c01ef
-
Size
4.3MB
-
Sample
221126-tamp6aeg52
-
MD5
d2d3ab71e4226a78431f1d82ea4c9ad9
-
SHA1
1b938b31329a7d3a5430fbdc5265b3c08ce4ad9f
-
SHA256
54bb061c9e20e11d604d8cc37f528ee4532837f16e4e690cd8afbcc9c70c01ef
-
SHA512
1c8ca95fc1e7a055e4db8149a2a8583f3368e50f2265b46779f073e49c47ea20e5fb555d198edd627133334c23bd3f5a41d3b06e1ff5ac4fd2f581aa3cd026d0
-
SSDEEP
98304:d34WumiHpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP3QV:d1u7djjqPdDsDbsU0akJyxL405+fiX
Behavioral task
behavioral1
Sample
54bb061c9e20e11d604d8cc37f528ee4532837f16e4e690cd8afbcc9c70c01ef.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
54bb061c9e20e11d604d8cc37f528ee4532837f16e4e690cd8afbcc9c70c01ef
-
Size
4.3MB
-
MD5
d2d3ab71e4226a78431f1d82ea4c9ad9
-
SHA1
1b938b31329a7d3a5430fbdc5265b3c08ce4ad9f
-
SHA256
54bb061c9e20e11d604d8cc37f528ee4532837f16e4e690cd8afbcc9c70c01ef
-
SHA512
1c8ca95fc1e7a055e4db8149a2a8583f3368e50f2265b46779f073e49c47ea20e5fb555d198edd627133334c23bd3f5a41d3b06e1ff5ac4fd2f581aa3cd026d0
-
SSDEEP
98304:d34WumiHpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP3QV:d1u7djjqPdDsDbsU0akJyxL405+fiX
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-