General
-
Target
2ud.exe
-
Size
4.2MB
-
Sample
230329-ajldxaea45
-
MD5
f2d96a7c78bacbdeb6a64f4b61a9eb80
-
SHA1
019d4951a57bc0bd6957c5aec24809b5449b8f45
-
SHA256
7063be36bb3a4a97742cdf3ddb85a25285b50bfadae5111e5b48ddd18d583e78
-
SHA512
0932e638fc72af2ecd948305bcf3f29d25677de84bc001b6a62d4339640f111dc988f9e41a7c819906d027e7c5549165b5b123b84945bfd67918e9bbaa7a1eed
-
SSDEEP
98304:ZNVpIBX3kf5xfyCgwbdHiVoZXSBjyVEnk/YRow0EcgUn5OxEiXHAa:LV+Z0fLyxwbdVZujGEnUYT7cgK4WiXHv
Behavioral task
behavioral1
Sample
2ud.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
2ud.exe
-
Size
4.2MB
-
MD5
f2d96a7c78bacbdeb6a64f4b61a9eb80
-
SHA1
019d4951a57bc0bd6957c5aec24809b5449b8f45
-
SHA256
7063be36bb3a4a97742cdf3ddb85a25285b50bfadae5111e5b48ddd18d583e78
-
SHA512
0932e638fc72af2ecd948305bcf3f29d25677de84bc001b6a62d4339640f111dc988f9e41a7c819906d027e7c5549165b5b123b84945bfd67918e9bbaa7a1eed
-
SSDEEP
98304:ZNVpIBX3kf5xfyCgwbdHiVoZXSBjyVEnk/YRow0EcgUn5OxEiXHAa:LV+Z0fLyxwbdVZujGEnUYT7cgK4WiXHv
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-