General
-
Target
2pKPn8W8KA.exe
-
Size
10.3MB
-
Sample
230701-pe9chahh91
-
MD5
050f6c582f98b5f1a5ea694d0f954b84
-
SHA1
c7e8b387bd37441f810e234b198bdfa0313e918b
-
SHA256
49dc6ce2205d41add463a360510abe01658f9b80cba062746c56f3328a996d49
-
SHA512
868a80bf8ff0f505d65c48aa40ac81e692bfcf5cccb118dea0350c0af3120bac8ff7d534ae02f744a51ba05aac7695ade703c85f02c248c3814416545ade963f
-
SSDEEP
196608:mk0m8ebS5PHmjvlnNXwLrtrP3Ur6ufqBj9VH3ZU40:mk0m8ebWPH6xwLrtD32vqB0
Static task
static1
Behavioral task
behavioral1
Sample
2pKPn8W8KA.exe
Resource
win10-20230621-en
Behavioral task
behavioral2
Sample
2pKPn8W8KA.exe
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
2pKPn8W8KA.exe
-
Size
10.3MB
-
MD5
050f6c582f98b5f1a5ea694d0f954b84
-
SHA1
c7e8b387bd37441f810e234b198bdfa0313e918b
-
SHA256
49dc6ce2205d41add463a360510abe01658f9b80cba062746c56f3328a996d49
-
SHA512
868a80bf8ff0f505d65c48aa40ac81e692bfcf5cccb118dea0350c0af3120bac8ff7d534ae02f744a51ba05aac7695ade703c85f02c248c3814416545ade963f
-
SSDEEP
196608:mk0m8ebS5PHmjvlnNXwLrtrP3Ur6ufqBj9VH3ZU40:mk0m8ebWPH6xwLrtD32vqB0
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-