General
-
Target
aaaa9e1541da2e1868572fcccca11801455e55f57067b2be9ddcc962672f8690
-
Size
6.8MB
-
Sample
231012-3txtxaha94
-
MD5
2ac737bac857c90f01b07843274b4b1a
-
SHA1
8451cadcbfb7b9a5037e729153bcab3d4ea261cf
-
SHA256
aaaa9e1541da2e1868572fcccca11801455e55f57067b2be9ddcc962672f8690
-
SHA512
a9fcacfb966fc30b7e7fc2b2c169111556a01ce891156f0997eeac3124a6d2a2d5fb041fa43b73ef345ef45794ce7700be559520c4bbce92fb58b20e18fb9dc2
-
SSDEEP
196608:H/5DSDC9ELyN3tZPDgksHoksRsXBV7YWglXD5:H/539yQ9lBsHoFRmpzglD5
Static task
static1
Behavioral task
behavioral1
Sample
aaaa9e1541da2e1868572fcccca11801455e55f57067b2be9ddcc962672f8690.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aaaa9e1541da2e1868572fcccca11801455e55f57067b2be9ddcc962672f8690.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
aaaa9e1541da2e1868572fcccca11801455e55f57067b2be9ddcc962672f8690
-
Size
6.8MB
-
MD5
2ac737bac857c90f01b07843274b4b1a
-
SHA1
8451cadcbfb7b9a5037e729153bcab3d4ea261cf
-
SHA256
aaaa9e1541da2e1868572fcccca11801455e55f57067b2be9ddcc962672f8690
-
SHA512
a9fcacfb966fc30b7e7fc2b2c169111556a01ce891156f0997eeac3124a6d2a2d5fb041fa43b73ef345ef45794ce7700be559520c4bbce92fb58b20e18fb9dc2
-
SSDEEP
196608:H/5DSDC9ELyN3tZPDgksHoksRsXBV7YWglXD5:H/539yQ9lBsHoFRmpzglD5
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-