General
-
Target
hahahahahahahahahahahahah.rar
-
Size
4.3MB
-
Sample
240127-2te4esfgbl
-
MD5
0323f2c7b7af87677efd63e31b57da08
-
SHA1
adab7f004d05a27d7b4e996e6bfe5c83d2f0812d
-
SHA256
099d621cb537bd7465a136f5021b7ea8b958fe26ad9b8c743bd0a2ec80d9e0bd
-
SHA512
330a3281384ca7d1cc631eb0d197e91d4fb6ef4d5811323d114133a416a95f17b421d8c53946c110826633ce8301256a8d7356242182a19670ce46a02c092ad1
-
SSDEEP
98304:yjw2RfT7iAQrMyvMKDgLrlx0sC82hePK/6vFmIFwAi2NFhuVu:yTfviNhcLZx0sChlEmIe+NFww
Behavioral task
behavioral1
Sample
login.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
login.exe
-
Size
429KB
-
MD5
b88444cf2c03ce4efe2a1608a379ee53
-
SHA1
68d9285ee72288656c258cf9db9c564226a48ddb
-
SHA256
d70e292a21ebc5ca1675ca585bcae52a51aad4bcee9bbbaf44b0a2cc635b64c7
-
SHA512
7c9e116a417f2a15d2ca3f70b61697c9e34b6131b12221032cde9d64c41993f6f8cfa34196ed99122aa34d59159955d6362827f0d4eee1688bce465539e8d633
-
SSDEEP
12288:Zt5NpMGK6Ia5Jr4IQAvq3eSKXvVZhuwxHvh:Zt5NGGzIo3QSqOS+VZhT
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-