General
-
Target
game1 (1).zip
-
Size
11.7MB
-
Sample
230512-qw33gsfe2t
-
MD5
946eb7e0ed68317ade2c1808d85ad34c
-
SHA1
fb5664f5f404c2c70d4a317e02b39f6d7d11f638
-
SHA256
d083d6441107b6a36d7965eadfd28bc8468bd1bdb2078a2a6700bfb98894531b
-
SHA512
9c31e99522fe8fa8565cf7fe6e035dbd21496601ed47820bab9bb711c78f8dbcfde2917cf9c9e9c1685ecfd9033ad00949786c3c3618765910b7873b5407bdd9
-
SSDEEP
196608:mFzxc8Fl3sS+b8yZla5W6oFCwmPAdQCowQUb7sT12IjSsQd5zvuqKPkfRH7H6gKT:uRR6fl0IFu5w9HspJusm5qv8JHWgKT
Behavioral task
behavioral1
Sample
game1 (1).zip
Resource
win10-20230220-es
Malware Config
Targets
-
-
Target
game1 (1).zip
-
Size
11.7MB
-
MD5
946eb7e0ed68317ade2c1808d85ad34c
-
SHA1
fb5664f5f404c2c70d4a317e02b39f6d7d11f638
-
SHA256
d083d6441107b6a36d7965eadfd28bc8468bd1bdb2078a2a6700bfb98894531b
-
SHA512
9c31e99522fe8fa8565cf7fe6e035dbd21496601ed47820bab9bb711c78f8dbcfde2917cf9c9e9c1685ecfd9033ad00949786c3c3618765910b7873b5407bdd9
-
SSDEEP
196608:mFzxc8Fl3sS+b8yZla5W6oFCwmPAdQCowQUb7sT12IjSsQd5zvuqKPkfRH7H6gKT:uRR6fl0IFu5w9HspJusm5qv8JHWgKT
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-