General
-
Target
iFRPFILE AIO v2.8.6.exe
-
Size
10.5MB
-
Sample
231026-cdfmksbe9w
-
MD5
549c4d3e3b61e4ff254cbd91dbd68ac6
-
SHA1
0ebb5d38acf3644ff61652b0ce66454c162d1ce5
-
SHA256
667f8c9bfb3fbbe9e22527cc4f4377397b75e0756876af5824c2518e1a343805
-
SHA512
572d8536f8fb586d6de12ce141e9627c7cf421e2e7ed9f6d9504f5320b4bf5c5b91fc428d7226ba776431fc6a171bd349dca3dcc46a88abe1231feb383f63478
-
SSDEEP
196608:oAkkqfhjWHAftegXXcUG4raKu24YY7HVT4hV0AD6QgqKRgX:bPHAfFmKr4YYH+EUWpgX
Behavioral task
behavioral1
Sample
iFRPFILE AIO v2.8.6.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
iFRPFILE AIO v2.8.6.exe
-
Size
10.5MB
-
MD5
549c4d3e3b61e4ff254cbd91dbd68ac6
-
SHA1
0ebb5d38acf3644ff61652b0ce66454c162d1ce5
-
SHA256
667f8c9bfb3fbbe9e22527cc4f4377397b75e0756876af5824c2518e1a343805
-
SHA512
572d8536f8fb586d6de12ce141e9627c7cf421e2e7ed9f6d9504f5320b4bf5c5b91fc428d7226ba776431fc6a171bd349dca3dcc46a88abe1231feb383f63478
-
SSDEEP
196608:oAkkqfhjWHAftegXXcUG4raKu24YY7HVT4hV0AD6QgqKRgX:bPHAfFmKr4YYH+EUWpgX
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-