General
-
Target
VEXO HWID.exe
-
Size
159KB
-
Sample
231011-1ax98aga27
-
MD5
e0ab1469be3a49a6bf96ab0015267441
-
SHA1
4f29106c2d1119cbbff8a8c1ad3c71b9696a5d60
-
SHA256
2301144a7bbd81e5bc8e6afe54d5a25c9cd84f3bc18074f6b3ae7506a7ff2d19
-
SHA512
8963c968b5ee7234d45300a7cd915a854233090d7919f123608f2188d571384ca2ee1fac9018726765b39e7b5a06ce2f2cf896585bb1c1ab62436857b9771cf9
-
SSDEEP
3072:zjXfH33anIotQW4dtP0eWhMviIPIozpD75y7UpbNEM2G5a8b9agxCqY:vXfXKnIBW4d3ZviIgo1D75y76NEJsb9F
Static task
static1
Behavioral task
behavioral1
Sample
VEXO HWID.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
VEXO HWID.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
VEXO HWID.exe
-
Size
159KB
-
MD5
e0ab1469be3a49a6bf96ab0015267441
-
SHA1
4f29106c2d1119cbbff8a8c1ad3c71b9696a5d60
-
SHA256
2301144a7bbd81e5bc8e6afe54d5a25c9cd84f3bc18074f6b3ae7506a7ff2d19
-
SHA512
8963c968b5ee7234d45300a7cd915a854233090d7919f123608f2188d571384ca2ee1fac9018726765b39e7b5a06ce2f2cf896585bb1c1ab62436857b9771cf9
-
SSDEEP
3072:zjXfH33anIotQW4dtP0eWhMviIPIozpD75y7UpbNEM2G5a8b9agxCqY:vXfXKnIBW4d3ZviIgo1D75y76NEJsb9F
Score9/10-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-