General
-
Target
420.exe
-
Size
8.3MB
-
Sample
231010-y95ggabd76
-
MD5
82f5fc1a6ce93b060d70d14dbeaac0e4
-
SHA1
5b48d3c8729e9f50b213ff14cbbe76c181063258
-
SHA256
c01f992823f1d37d440ba0349d2da7a5b03ac477af796a45a3818784f4f48348
-
SHA512
fb7467fbb3eec4e74ed9461bc1ea3de389e9a53cde6d292a1f58e7ebf678252d4ead4f889730df6dd658d7e7e208ff820ff077daad8da4e4c2baf02b73d10885
-
SSDEEP
196608:CRWX/WGom779THGCCcCZsGKygnzbn1Wn9aMa4A0H/FLL:CRWHom/9THGCCcXGKz5Wrgm3
Behavioral task
behavioral1
Sample
420.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
420.exe
-
Size
8.3MB
-
MD5
82f5fc1a6ce93b060d70d14dbeaac0e4
-
SHA1
5b48d3c8729e9f50b213ff14cbbe76c181063258
-
SHA256
c01f992823f1d37d440ba0349d2da7a5b03ac477af796a45a3818784f4f48348
-
SHA512
fb7467fbb3eec4e74ed9461bc1ea3de389e9a53cde6d292a1f58e7ebf678252d4ead4f889730df6dd658d7e7e208ff820ff077daad8da4e4c2baf02b73d10885
-
SSDEEP
196608:CRWX/WGom779THGCCcCZsGKygnzbn1Wn9aMa4A0H/FLL:CRWHom/9THGCCcXGKz5Wrgm3
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-