General
-
Target
e9b513146741397c9731871a5e911239
-
Size
54KB
-
Sample
231222-tlyxkagdb4
-
MD5
e9b513146741397c9731871a5e911239
-
SHA1
754a8ecace3d3ab6b81c8be7d8d24af31ed91f16
-
SHA256
99daf146aa2489ced5e8763fa5c5de67019de80369383402bd1e422127960fff
-
SHA512
cdc70846b5824a6db474786579167d3e23830a2cf38c5725a32bd4d08b53eae222c8f5f15c284c65d922b2ca23aef6d19be4c3085a23a966363f3080c6ec1e55
-
SSDEEP
1536:IuqXk2fJWIIsrxYvaRvNaKMu+/Jj8DT1iy11WZwoQD:Nek0KiR1uu+/Md1bD
Static task
static1
Behavioral task
behavioral1
Sample
e9b513146741397c9731871a5e911239.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e9b513146741397c9731871a5e911239.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
e9b513146741397c9731871a5e911239
-
Size
54KB
-
MD5
e9b513146741397c9731871a5e911239
-
SHA1
754a8ecace3d3ab6b81c8be7d8d24af31ed91f16
-
SHA256
99daf146aa2489ced5e8763fa5c5de67019de80369383402bd1e422127960fff
-
SHA512
cdc70846b5824a6db474786579167d3e23830a2cf38c5725a32bd4d08b53eae222c8f5f15c284c65d922b2ca23aef6d19be4c3085a23a966363f3080c6ec1e55
-
SSDEEP
1536:IuqXk2fJWIIsrxYvaRvNaKMu+/Jj8DT1iy11WZwoQD:Nek0KiR1uu+/Md1bD
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-