General
-
Target
9e63f8652109a5c0f69e114834f6c0c652279a60eac4b4517fa6a7772a4c2303
-
Size
4.3MB
-
Sample
221127-mmtkxaed4w
-
MD5
48f8cd0ab155a023bc71bae2d49b280a
-
SHA1
0baa14781a77c100304fd258fe3951e273bebd95
-
SHA256
9e63f8652109a5c0f69e114834f6c0c652279a60eac4b4517fa6a7772a4c2303
-
SHA512
4a0c095b3dc401a7319ab571473b41758f4921116af31ad498fc798c58e6ee64485119f2958b51ee0068ae0247a98740c33d98ebd66ae7b34aff4e1e0737f947
-
SSDEEP
98304:LzRIO+HpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP3Q9j:3q5djjqPdDsDbsU0akJyxL405+fiX
Behavioral task
behavioral1
Sample
9e63f8652109a5c0f69e114834f6c0c652279a60eac4b4517fa6a7772a4c2303.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
9e63f8652109a5c0f69e114834f6c0c652279a60eac4b4517fa6a7772a4c2303
-
Size
4.3MB
-
MD5
48f8cd0ab155a023bc71bae2d49b280a
-
SHA1
0baa14781a77c100304fd258fe3951e273bebd95
-
SHA256
9e63f8652109a5c0f69e114834f6c0c652279a60eac4b4517fa6a7772a4c2303
-
SHA512
4a0c095b3dc401a7319ab571473b41758f4921116af31ad498fc798c58e6ee64485119f2958b51ee0068ae0247a98740c33d98ebd66ae7b34aff4e1e0737f947
-
SSDEEP
98304:LzRIO+HpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP3Q9j:3q5djjqPdDsDbsU0akJyxL405+fiX
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-