General
-
Target
wallpaperenginedebugger64.exe
-
Size
3.9MB
-
Sample
230418-zk89ssec26
-
MD5
da9c56ac2e6993e0ce098bf5654f702c
-
SHA1
66a5ae109af8fd5ab81a6ba77038e56c475bcfc8
-
SHA256
82481142629a5cd217ca98a4817f4b7559fad3986ab8f0f9bbf53872ffc87770
-
SHA512
3dfba703a96ed40ef59e42662a6c90a1f56e319d105bcc0d564ad2c8898db378780761285fbfa69c7dc9d90afaea5aa41e747e8c6eb175c7e6f53489819ed22b
-
SSDEEP
98304:nOkUPphnJ/kZtjxeP7jm+OPPx/thpa3Mw+2fm:nOkURhnJ/kHOm+EVO3Mw+2e
Malware Config
Targets
-
-
Target
wallpaperenginedebugger64.exe
-
Size
3.9MB
-
MD5
da9c56ac2e6993e0ce098bf5654f702c
-
SHA1
66a5ae109af8fd5ab81a6ba77038e56c475bcfc8
-
SHA256
82481142629a5cd217ca98a4817f4b7559fad3986ab8f0f9bbf53872ffc87770
-
SHA512
3dfba703a96ed40ef59e42662a6c90a1f56e319d105bcc0d564ad2c8898db378780761285fbfa69c7dc9d90afaea5aa41e747e8c6eb175c7e6f53489819ed22b
-
SSDEEP
98304:nOkUPphnJ/kZtjxeP7jm+OPPx/thpa3Mw+2fm:nOkURhnJ/kHOm+EVO3Mw+2e
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-