General
-
Target
c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45
-
Size
3.4MB
-
Sample
230317-17ppcaab88
-
MD5
b89cfb2403ff3c814ddd79624874e213
-
SHA1
d107ad1b15cde70754142f591a5581d3b28ef356
-
SHA256
c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45
-
SHA512
5b3e7554d219ffae18daeaa03d654ba20be26f19092616aef19b48074376834f0a2369a9d05ed338c9b9fa4027226bec3c3b58a9c05c15185e14e1136ae2c571
-
SSDEEP
98304:UbaD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzFm:0t4rqN19n/
Static task
static1
Behavioral task
behavioral1
Sample
c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45
-
Size
3.4MB
-
MD5
b89cfb2403ff3c814ddd79624874e213
-
SHA1
d107ad1b15cde70754142f591a5581d3b28ef356
-
SHA256
c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45
-
SHA512
5b3e7554d219ffae18daeaa03d654ba20be26f19092616aef19b48074376834f0a2369a9d05ed338c9b9fa4027226bec3c3b58a9c05c15185e14e1136ae2c571
-
SSDEEP
98304:UbaD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzFm:0t4rqN19n/
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Suspicious use of SetThreadContext
-