General
-
Target
xbtloader2.exe
-
Size
4.9MB
-
Sample
240112-yp7q4afbd8
-
MD5
99fa056f91d3e594881f1db4be592b80
-
SHA1
c07cfc750a66d5bceecd9a0831bace423c3c9124
-
SHA256
21fe219fef852bd4c7f4bb785dc1bec739f07d7050c73edad54090bae8763402
-
SHA512
5fb2e7d9644c1bebada8acec12077d61ef64b824e954e95bfe6f88d9ce516e31bf6f9e025cbcd3f5306554bd6886c0b65e246dab59296fcc43b10cb751280e83
-
SSDEEP
98304:5v9JCWf0q3lG3qSUO6bv5GKWRrAHnsqfCcnhfps:VTHf0q3EDUnhGpRrS15hfu
Behavioral task
behavioral1
Sample
xbtloader2.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
xbtloader2.exe
-
Size
4.9MB
-
MD5
99fa056f91d3e594881f1db4be592b80
-
SHA1
c07cfc750a66d5bceecd9a0831bace423c3c9124
-
SHA256
21fe219fef852bd4c7f4bb785dc1bec739f07d7050c73edad54090bae8763402
-
SHA512
5fb2e7d9644c1bebada8acec12077d61ef64b824e954e95bfe6f88d9ce516e31bf6f9e025cbcd3f5306554bd6886c0b65e246dab59296fcc43b10cb751280e83
-
SSDEEP
98304:5v9JCWf0q3lG3qSUO6bv5GKWRrAHnsqfCcnhfps:VTHf0q3EDUnhGpRrS15hfu
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-