General
-
Target
dynospoofer.exe
-
Size
3.1MB
-
Sample
230417-cc9t2acf97
-
MD5
0cb15041fa23c6dc2ce34ef9cb9eb515
-
SHA1
9fe8d75d9253ae057ceff43d8d63a901754ece53
-
SHA256
a2fe8032c38360525457ebbd57f8eb2bbc5d5da33e83cf7750f2dee519a05179
-
SHA512
818ae1f92a16579bb7ac8296676c04b659f6126decbc1905da5d837f0ebff1ca680464272c0d8eacd95549efe05eb0ee0e3b32ed0a68bbeff26c56a103dd7b43
-
SSDEEP
49152:ob6mCmdd+IheCEKm6+llzLQBmfpaHnbc+12LhDHPvlOn6caUgtdo:rfm3+IhEc+ccR8b52p9UNNOdo
Behavioral task
behavioral1
Sample
dynospoofer.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
dynospoofer.exe
-
Size
3.1MB
-
MD5
0cb15041fa23c6dc2ce34ef9cb9eb515
-
SHA1
9fe8d75d9253ae057ceff43d8d63a901754ece53
-
SHA256
a2fe8032c38360525457ebbd57f8eb2bbc5d5da33e83cf7750f2dee519a05179
-
SHA512
818ae1f92a16579bb7ac8296676c04b659f6126decbc1905da5d837f0ebff1ca680464272c0d8eacd95549efe05eb0ee0e3b32ed0a68bbeff26c56a103dd7b43
-
SSDEEP
49152:ob6mCmdd+IheCEKm6+llzLQBmfpaHnbc+12LhDHPvlOn6caUgtdo:rfm3+IhEc+ccR8b52p9UNNOdo
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-