General
-
Target
9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634
-
Size
180KB
-
Sample
230408-hw1clacc33
-
MD5
c874f6337df1d8205b7972eb329d62a4
-
SHA1
862f07f883d1804f0cfc557a0017319c1e3d083d
-
SHA256
9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634
-
SHA512
d90884fb2e77dd986bacd979330073dbb2daddde7f45187d6f464b88f4cb40fc04f512dbb885df90145eae6d1a189476d1aa24952ef52393c7241be8874f9df0
-
SSDEEP
3072:UJfyTicyCTvl/iwRtpXTnamb0E2HIIO0FEpzY8NmYvWrEjYzu3aWuIo/3ZJ8fS7Q:U41yclqLmwjTqVNmYv3MzAuIoXkSi39e
Behavioral task
behavioral1
Sample
9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634
-
Size
180KB
-
MD5
c874f6337df1d8205b7972eb329d62a4
-
SHA1
862f07f883d1804f0cfc557a0017319c1e3d083d
-
SHA256
9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634
-
SHA512
d90884fb2e77dd986bacd979330073dbb2daddde7f45187d6f464b88f4cb40fc04f512dbb885df90145eae6d1a189476d1aa24952ef52393c7241be8874f9df0
-
SSDEEP
3072:UJfyTicyCTvl/iwRtpXTnamb0E2HIIO0FEpzY8NmYvWrEjYzu3aWuIo/3ZJ8fS7Q:U41yclqLmwjTqVNmYv3MzAuIoXkSi39e
-
Detect Blackmoon payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-