General
-
Target
33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0
-
Size
3.4MB
-
Sample
230317-17c1jscc4s
-
MD5
41b8532d997713259f828693c247e2f6
-
SHA1
91ad435234c77841bdd2df3879752e4d0340d093
-
SHA256
33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0
-
SHA512
65a50595b57de8a6b79796ed4bfed86abfb6dabf84f830e25a4e40cf3c7f4ab663bfd079b7665a671b0594b9b17ec5d5a2bbd3367cd8f317887b00c1d63c8050
-
SSDEEP
98304:7aD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzF7:vt4rqN19ne
Static task
static1
Behavioral task
behavioral1
Sample
33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0
-
Size
3.4MB
-
MD5
41b8532d997713259f828693c247e2f6
-
SHA1
91ad435234c77841bdd2df3879752e4d0340d093
-
SHA256
33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0
-
SHA512
65a50595b57de8a6b79796ed4bfed86abfb6dabf84f830e25a4e40cf3c7f4ab663bfd079b7665a671b0594b9b17ec5d5a2bbd3367cd8f317887b00c1d63c8050
-
SSDEEP
98304:7aD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzF7:vt4rqN19ne
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Suspicious use of SetThreadContext
-