General
-
Target
sus
-
Size
8.0MB
-
Sample
230529-1jffrsdf72
-
MD5
83aa432c43f01541e4f1e2f995940e69
-
SHA1
931b6fd3e7ee5631fbc583640805809d9f2acc58
-
SHA256
82f33adfecd67735874cdc9c2bfd27d4b5b904c828d861544c249798a3e65e7e
-
SHA512
1c962495430b092e88bba43cef34d44ce1b6e23b6ddb610a1489cbb851db3dc1d322fc3c7b70fa952ff8009b76a9aa3d62daf0d8394f3f46f7b15a5105118278
-
SSDEEP
196608:ecUG4raKu24YY7HVT4hV0AD6QgqKRgXTJ:UmKr4YYH+EUWpgXd
Behavioral task
behavioral1
Sample
sus.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
sus
-
Size
8.0MB
-
MD5
83aa432c43f01541e4f1e2f995940e69
-
SHA1
931b6fd3e7ee5631fbc583640805809d9f2acc58
-
SHA256
82f33adfecd67735874cdc9c2bfd27d4b5b904c828d861544c249798a3e65e7e
-
SHA512
1c962495430b092e88bba43cef34d44ce1b6e23b6ddb610a1489cbb851db3dc1d322fc3c7b70fa952ff8009b76a9aa3d62daf0d8394f3f46f7b15a5105118278
-
SSDEEP
196608:ecUG4raKu24YY7HVT4hV0AD6QgqKRgXTJ:UmKr4YYH+EUWpgXd
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-