General
-
Target
050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c_JC.lnk
-
Size
4.4MB
-
Sample
231011-nj2b1sbg6x
-
MD5
45aca657889ac60f1ee129c5c8442cdb
-
SHA1
5db63aa4f87c6194d62b2e2e59c54bfcf9fbc9fc
-
SHA256
050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c
-
SHA512
0f76eb2f8685c9659805efefcf22e593f51622886415c1f238a479d2594a9ada13966ee0cd651adb7fb66a106f34e2c0deddc180207301263d1cc5caff7191ef
-
SSDEEP
98304:agHgGZPRjDjDN/v1gFXzz3WC9rW4IowsS7gpfCRhPhajd7H/:akPRj/DBNgF+CPIow57gIPIjdH/
Static task
static1
Behavioral task
behavioral1
Sample
050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c_JC.lnk
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c_JC.lnk
-
Size
4.4MB
-
MD5
45aca657889ac60f1ee129c5c8442cdb
-
SHA1
5db63aa4f87c6194d62b2e2e59c54bfcf9fbc9fc
-
SHA256
050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c
-
SHA512
0f76eb2f8685c9659805efefcf22e593f51622886415c1f238a479d2594a9ada13966ee0cd651adb7fb66a106f34e2c0deddc180207301263d1cc5caff7191ef
-
SSDEEP
98304:agHgGZPRjDjDN/v1gFXzz3WC9rW4IowsS7gpfCRhPhajd7H/:akPRj/DBNgF+CPIow57gIPIjdH/
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-