General
-
Target
Loader.exe
-
Size
44.2MB
-
Sample
230901-3w4p8sac9x
-
MD5
3717f7d447fa2e11b78085b70b4db53d
-
SHA1
4fdceba008248c134f1ec61b16968816716b0140
-
SHA256
cc566bd4e3bab54426f4940e6817ff0a1e0be39bfd2ece80cce4ee0c0674e02d
-
SHA512
a6c942095ace315c77934ac2eff9f5535d992342abee31b8a2c328e694499c28ee71a3d9fb80351f9dfd62cb28c4eb73fb00563dae71f02fb6759c2c29e64ee2
-
SSDEEP
786432:yte4pWy7IuSLAtMXnjj/o0nGsJqNdT8biIY9eZOtuhq+4J/EjXbF:yte4UuSLAiXnjj1k7gnaeZOEh74JkbF
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
44.2MB
-
MD5
3717f7d447fa2e11b78085b70b4db53d
-
SHA1
4fdceba008248c134f1ec61b16968816716b0140
-
SHA256
cc566bd4e3bab54426f4940e6817ff0a1e0be39bfd2ece80cce4ee0c0674e02d
-
SHA512
a6c942095ace315c77934ac2eff9f5535d992342abee31b8a2c328e694499c28ee71a3d9fb80351f9dfd62cb28c4eb73fb00563dae71f02fb6759c2c29e64ee2
-
SSDEEP
786432:yte4pWy7IuSLAtMXnjj/o0nGsJqNdT8biIY9eZOtuhq+4J/EjXbF:yte4UuSLAiXnjj1k7gnaeZOEh74JkbF
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1