General
-
Target
1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d
-
Size
5.1MB
-
Sample
230207-khl9xsae49
-
MD5
f705b8fcd18c72c83bfa1b1a44bc0a41
-
SHA1
542dbd21cbd8e15a7c4f9289b3ac103a4cb97dd4
-
SHA256
1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d
-
SHA512
e513e085998c94d84cde937adea4d6fda5e31ee906be4c7c95d54431295e6881d8a6df5d386dd6eb6b0c9083ac0090ae8ba3d880a31cca5fda62e206401f8922
-
SSDEEP
98304:akU5/SU9MIYjw6FxzchqSQvN7pkCF4ks+vX65otrpCpXtrdHtC6M2XX:05/SU9MNFxzcwznkSaiGodcpXdsoX
Malware Config
Targets
-
-
Target
1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d
-
Size
5.1MB
-
MD5
f705b8fcd18c72c83bfa1b1a44bc0a41
-
SHA1
542dbd21cbd8e15a7c4f9289b3ac103a4cb97dd4
-
SHA256
1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d
-
SHA512
e513e085998c94d84cde937adea4d6fda5e31ee906be4c7c95d54431295e6881d8a6df5d386dd6eb6b0c9083ac0090ae8ba3d880a31cca5fda62e206401f8922
-
SSDEEP
98304:akU5/SU9MIYjw6FxzchqSQvN7pkCF4ks+vX65otrpCpXtrdHtC6M2XX:05/SU9MNFxzcwznkSaiGodcpXdsoX
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-