General
-
Target
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.zip
-
Size
3.3MB
-
Sample
230321-rz2t9sdc8w
-
MD5
7682a71761d242ca2ea5b1a0909ee134
-
SHA1
61428a3635a9f64b5f48b56f9d19435069722e22
-
SHA256
840bfabcd932831d640bb2dbe6605d38e825a17d070fdb40cf85d2c7c8575732
-
SHA512
4770188fa1586816c5639160b8c7a9e9064dd0be3a433639af94241b4ef3df4c37616c3a54f4223633cd77a9e6b4d50cd796448b92b258a65fe9b9b65bdb4457
-
SSDEEP
98304:HfYzn+fZEICTPAt+ye7hOqlocev6YOsM/CLZ5oyft5CIVV:Hwz2ZEICPVye7EqlwvTOsM5yV/V
Behavioral task
behavioral1
Sample
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe
-
Size
3.4MB
-
MD5
588cd06833601b361f843c87056fd5a9
-
SHA1
36fd19550588e46b7ae12639421e9768f6172f0a
-
SHA256
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1
-
SHA512
74ca11d07f98dcbae852fb94fd3fa5fb641a73917c6e85b1e2e0f49c5e8f604a14ea3deaf146ce23d4814f3daf2082d3c90d72d2759507d51cf45284f50fc979
-
SSDEEP
98304:cPMHpHh81TVkOjPdBx425wr7MARYza/PnrHT86b4GGsVJxz:cUrkTiOjPn76hCa/PrHlrVJxz
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-