General
-
Target
Downloads.7z
-
Size
6.4MB
-
Sample
230419-mxejqsaa63
-
MD5
df299e73965f0856531452cfd7e76433
-
SHA1
fe3f3a07828dcbd2143dff4024df39d160586f5e
-
SHA256
33f8d59caf3d26bd6434af7814e199c0e08b1757e112f521385d5f396dec68c8
-
SHA512
8fa665fd7c9c3b6141ccfb41ea7848317122882496c41a76e594d27b9c1b834809f3d39d1beb677a46dbcffbd50ddf10b37a64a7535d7962e4f10708095c248c
-
SSDEEP
196608:gRsir5MEr82uRqbv1gOTPviIjrA8wAabtWobRoYR9G5wNAmJGdxg:MNr5N85KTviOrAcStWobRPvYwNv0g
Behavioral task
behavioral1
Sample
Downloads.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Downloads.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
TwentyApp.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
Downloads.7z
-
Size
6.4MB
-
MD5
df299e73965f0856531452cfd7e76433
-
SHA1
fe3f3a07828dcbd2143dff4024df39d160586f5e
-
SHA256
33f8d59caf3d26bd6434af7814e199c0e08b1757e112f521385d5f396dec68c8
-
SHA512
8fa665fd7c9c3b6141ccfb41ea7848317122882496c41a76e594d27b9c1b834809f3d39d1beb677a46dbcffbd50ddf10b37a64a7535d7962e4f10708095c248c
-
SSDEEP
196608:gRsir5MEr82uRqbv1gOTPviIjrA8wAabtWobRoYR9G5wNAmJGdxg:MNr5N85KTviOrAcStWobRPvYwNv0g
Score3/10 -
-
-
Target
TwentyApp.exe
-
Size
3.3MB
-
MD5
5e2b1df5effbe5123eeff6752af2ca59
-
SHA1
2e1597b42c40155aa4f56ed708ea4aeb2a5d8698
-
SHA256
cd5d681f249663dde55b694693ead4e63ff1d626e5db57975aeaa41e65205c37
-
SHA512
e1ce42dbea6940dbf883ba32f4e934dce2803606a3109369ddfc9cf47e89d82f4f6fcb1854a0745a0e4cb0ad1e095627f35c03a06fa5f42693638039b58698c2
-
SSDEEP
98304:mZgO4UAJkCxZt3e0Y6qRlp5CNMqMDstLS7cqjAny:mZg3JlB3gXRlpkMqUM6cqjo
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-