General
-
Target
6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6
-
Size
2.9MB
-
Sample
230417-q2542aed75
-
MD5
85150fc161f06e745f463388cd0fff4f
-
SHA1
38528c83c1fca3bdd07d6ed03a95deaab5e2b453
-
SHA256
6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6
-
SHA512
e505eaad59721c5f0ecce973b1a54394c164d47318ce6c6dad444f72696d8c50eb96b824377ec8ecb3c49f2e87541b70bc337e0e3bc38f03dce7c7342cf9acfe
-
SSDEEP
49152:iTuQ/+UDDq542HWdVlV7t2ftBl2fULWXBnWXg/wOy6vb3dvwM3Qh5h:iTu4+U/2QlVmtBaJw6z3Nwj
Static task
static1
Behavioral task
behavioral1
Sample
6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6
-
Size
2.9MB
-
MD5
85150fc161f06e745f463388cd0fff4f
-
SHA1
38528c83c1fca3bdd07d6ed03a95deaab5e2b453
-
SHA256
6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6
-
SHA512
e505eaad59721c5f0ecce973b1a54394c164d47318ce6c6dad444f72696d8c50eb96b824377ec8ecb3c49f2e87541b70bc337e0e3bc38f03dce7c7342cf9acfe
-
SSDEEP
49152:iTuQ/+UDDq542HWdVlV7t2ftBl2fULWXBnWXg/wOy6vb3dvwM3Qh5h:iTu4+U/2QlVmtBaJw6z3Nwj
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-