General
-
Target
633df38901b5b67a84d700af932120276d488ae579847151c23d9a10016a29df
-
Size
8MB
-
Sample
230125-m32apafg75
-
MD5
1bb625c8f75430750502ec510de1b7f0
-
SHA1
b2990f63be9060b1971eb6a67af1ee6853b3c335
-
SHA256
633df38901b5b67a84d700af932120276d488ae579847151c23d9a10016a29df
-
SHA512
c95143ac4a23c00c35257e8443ad52e831a8cf0e9d3640dd6c933f17ba8f330e632ee3337b48127b255c5aef1b33eec2435b6223e663979d0de7b54a71719ef1
-
SSDEEP
196608:TPZtOqPn1oKtNCIvNd1vXjYhSHm9DwA0QHm/+pMe:TBwAftNxvNd1vzOSGKfzO
Static task
static1
Behavioral task
behavioral1
Sample
633df38901b5b67a84d700af932120276d488ae579847151c23d9a10016a29df.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
633df38901b5b67a84d700af932120276d488ae579847151c23d9a10016a29df
-
Size
8MB
-
MD5
1bb625c8f75430750502ec510de1b7f0
-
SHA1
b2990f63be9060b1971eb6a67af1ee6853b3c335
-
SHA256
633df38901b5b67a84d700af932120276d488ae579847151c23d9a10016a29df
-
SHA512
c95143ac4a23c00c35257e8443ad52e831a8cf0e9d3640dd6c933f17ba8f330e632ee3337b48127b255c5aef1b33eec2435b6223e663979d0de7b54a71719ef1
-
SSDEEP
196608:TPZtOqPn1oKtNCIvNd1vXjYhSHm9DwA0QHm/+pMe:TBwAftNxvNd1vzOSGKfzO
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-
Adds Run key to start application
-