General
-
Target
winrar-611br.msi
-
Size
4.5MB
-
Sample
230227-x933zafd56
-
MD5
68ba045e1427d63d03660ef2d88584d0
-
SHA1
a3e9bd9adddf1aaaaff03cd69a7128e6fc774977
-
SHA256
e06b212b0c26d4f385a3623c64820b3ea4bbd83065646a38d1f3e0cfdfbb0898
-
SHA512
d677806a4c4ed419995b0ead65db4081c3e4b002e400fafb8d042d6695e7e17cc476a0ccc8df9c1caed164254ba2536c73891f89f6f9f57aea7a5421a6d964e8
-
SSDEEP
98304:MYGKdAHTgvV1OsKnG5vgzfTVkdRTpRjbrvC7gEjT7A3:i81OsKG6zfTVkddpdTCRj
Static task
static1
Behavioral task
behavioral1
Sample
winrar-611br.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
winrar-611br.msi
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
winrar-611br.msi
-
Size
4.5MB
-
MD5
68ba045e1427d63d03660ef2d88584d0
-
SHA1
a3e9bd9adddf1aaaaff03cd69a7128e6fc774977
-
SHA256
e06b212b0c26d4f385a3623c64820b3ea4bbd83065646a38d1f3e0cfdfbb0898
-
SHA512
d677806a4c4ed419995b0ead65db4081c3e4b002e400fafb8d042d6695e7e17cc476a0ccc8df9c1caed164254ba2536c73891f89f6f9f57aea7a5421a6d964e8
-
SSDEEP
98304:MYGKdAHTgvV1OsKnG5vgzfTVkdRTpRjbrvC7gEjT7A3:i81OsKG6zfTVkddpdTCRj
Score10/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-