General
-
Target
84c4OGF1.exe
-
Size
3.4MB
-
Sample
231003-2qapjahg53
-
MD5
ee1a1964f97f469e9ede06c68f5b2111
-
SHA1
cc0bea12750522e977d5fce70fb0087f2d10cacc
-
SHA256
83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74
-
SHA512
eecd8982b5ad80b0824ef07185d246aca16528d1c846a04fb2ce46122d85b31330b20630dd6e4a4c7d5f3519e3b21e9cfa90e18a335646734abcf396f9c3bc18
-
SSDEEP
98304:JUwOIEK84WQsykAeYXkAeYUaMImg8C0Qu9JuR21C/yIq/dhl/O4i/TksjdFwvhzh:JUwOIEK84WQsykAeYXkAeYUaMImg8C0j
Static task
static1
Behavioral task
behavioral1
Sample
84c4OGF1.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
84c4OGF1.exe
-
Size
3.4MB
-
MD5
ee1a1964f97f469e9ede06c68f5b2111
-
SHA1
cc0bea12750522e977d5fce70fb0087f2d10cacc
-
SHA256
83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74
-
SHA512
eecd8982b5ad80b0824ef07185d246aca16528d1c846a04fb2ce46122d85b31330b20630dd6e4a4c7d5f3519e3b21e9cfa90e18a335646734abcf396f9c3bc18
-
SSDEEP
98304:JUwOIEK84WQsykAeYXkAeYUaMImg8C0Qu9JuR21C/yIq/dhl/O4i/TksjdFwvhzh:JUwOIEK84WQsykAeYXkAeYUaMImg8C0j
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Suspicious use of SetThreadContext
-