General
-
Target
YS_External_V2.exe
-
Size
23.7MB
-
Sample
230325-v3y5bsfg6v
-
MD5
a55deccd022c6cf5a67bd3138a0a6d69
-
SHA1
cef90145fa44b969af6ec76b7ac650e778e5c953
-
SHA256
914d9b43d9d945fe5c372487ffa692b6d1d68e64945a726b2c35699c31af661e
-
SHA512
b797d8ab14c3acc232d243c5a7bd0958929d93c4ba96b4dd68f3167c5b8753c63a874b1a6f0cdcd7f43dcb250958e0572b23ceee6b6e36a1fb1a011fb2e5ada6
-
SSDEEP
393216:Mm9FpgMIfmAL0Fnch/d9WOBkUS9RBnuBRhfvSoWchi3x1Bn:D97gb0dcd9jkLT8BjYc2N
Behavioral task
behavioral1
Sample
YS_External_V2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
YS_External_V2.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
YS_External_V2.exe
-
Size
23.7MB
-
MD5
a55deccd022c6cf5a67bd3138a0a6d69
-
SHA1
cef90145fa44b969af6ec76b7ac650e778e5c953
-
SHA256
914d9b43d9d945fe5c372487ffa692b6d1d68e64945a726b2c35699c31af661e
-
SHA512
b797d8ab14c3acc232d243c5a7bd0958929d93c4ba96b4dd68f3167c5b8753c63a874b1a6f0cdcd7f43dcb250958e0572b23ceee6b6e36a1fb1a011fb2e5ada6
-
SSDEEP
393216:Mm9FpgMIfmAL0Fnch/d9WOBkUS9RBnuBRhfvSoWchi3x1Bn:D97gb0dcd9jkLT8BjYc2N
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-