General
-
Target
virustotal.txt
-
Size
110B
-
Sample
230716-gf6c8scf56
-
MD5
225d070db1e15ce65b128edfa60ec81e
-
SHA1
65f728a51b9da2bcc290a75dd106d5fe07314ffa
-
SHA256
74f6e04559abc2cd3e7acf03345b99ce131d618f38048363f031764f9f4ce8aa
-
SHA512
d000b6535064598bbb09bf43bf898da49852b763ca87b9dff42c856329a0c612a47e6ba342aad2c218b1d9007a07b9b5a77b0139f5a8966c88b8c15a1aeb3f67
Static task
static1
Behavioral task
behavioral1
Sample
virustotal.txt
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
virustotal.txt
-
Size
110B
-
MD5
225d070db1e15ce65b128edfa60ec81e
-
SHA1
65f728a51b9da2bcc290a75dd106d5fe07314ffa
-
SHA256
74f6e04559abc2cd3e7acf03345b99ce131d618f38048363f031764f9f4ce8aa
-
SHA512
d000b6535064598bbb09bf43bf898da49852b763ca87b9dff42c856329a0c612a47e6ba342aad2c218b1d9007a07b9b5a77b0139f5a8966c88b8c15a1aeb3f67
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-