General
-
Target
c98631ac5f43c7b1d45fedc2c8d54696860b92ed73a28376c200508b4a67f697
-
Size
159KB
-
Sample
221127-tnexgaed4y
-
MD5
f35d5b7f3334a3eea993547a319bd6cd
-
SHA1
dad10e0c1b97cf720e81a10edde8a468990ca140
-
SHA256
c98631ac5f43c7b1d45fedc2c8d54696860b92ed73a28376c200508b4a67f697
-
SHA512
7653eccb47378399d45ab6a8d19df73e1e1e3bb03d42db8dc2b83856b12e2255522cbc02084dd06b2f22602b0d0b82a28dda5e74c569fd7e8bab3fc0c0a47fd4
-
SSDEEP
3072:mVtnIr8svE4OoqSwL+avJ8se/CLtHFy4GXdjIMIXBEIx2Dcx:DbqS09LJFyPNjUXB5UG
Static task
static1
Behavioral task
behavioral1
Sample
c98631ac5f43c7b1d45fedc2c8d54696860b92ed73a28376c200508b4a67f697.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c98631ac5f43c7b1d45fedc2c8d54696860b92ed73a28376c200508b4a67f697.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
c98631ac5f43c7b1d45fedc2c8d54696860b92ed73a28376c200508b4a67f697
-
Size
159KB
-
MD5
f35d5b7f3334a3eea993547a319bd6cd
-
SHA1
dad10e0c1b97cf720e81a10edde8a468990ca140
-
SHA256
c98631ac5f43c7b1d45fedc2c8d54696860b92ed73a28376c200508b4a67f697
-
SHA512
7653eccb47378399d45ab6a8d19df73e1e1e3bb03d42db8dc2b83856b12e2255522cbc02084dd06b2f22602b0d0b82a28dda5e74c569fd7e8bab3fc0c0a47fd4
-
SSDEEP
3072:mVtnIr8svE4OoqSwL+avJ8se/CLtHFy4GXdjIMIXBEIx2Dcx:DbqS09LJFyPNjUXB5UG
Score9/10-
Looks for VirtualBox Guest Additions in registry
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Adds Run key to start application
-