General
-
Target
celexware! (1).exe
-
Size
4.0MB
-
Sample
240222-3cjwqagg57
-
MD5
e0f791ee5ec8fbc02d0d50730bbe54ce
-
SHA1
79e26ea4cbef52244855082bdce86f65aa2da00f
-
SHA256
e919724919f29ea9728aa7aca9695f14fb28c48a00bb7928d216e5e9807c34ce
-
SHA512
2fe2af1cb954cad00a5e73f343f257dc24031feb3891594177d19d2ed5ca9c68b2bcf2dc220f5ca4ef4014138aaad3befa0e57de8b55a84395bb3a8306501834
-
SSDEEP
98304:TRauJx7Uw8ZAJBPVKC6FBCcl9R9yEyiVRaK+TkA56KLwxI:kaUw5MYcl9PtyE+ghI
Behavioral task
behavioral1
Sample
celexware! (1).exe
Resource
win10-20240221-en
Malware Config
Targets
-
-
Target
celexware! (1).exe
-
Size
4.0MB
-
MD5
e0f791ee5ec8fbc02d0d50730bbe54ce
-
SHA1
79e26ea4cbef52244855082bdce86f65aa2da00f
-
SHA256
e919724919f29ea9728aa7aca9695f14fb28c48a00bb7928d216e5e9807c34ce
-
SHA512
2fe2af1cb954cad00a5e73f343f257dc24031feb3891594177d19d2ed5ca9c68b2bcf2dc220f5ca4ef4014138aaad3befa0e57de8b55a84395bb3a8306501834
-
SSDEEP
98304:TRauJx7Uw8ZAJBPVKC6FBCcl9R9yEyiVRaK+TkA56KLwxI:kaUw5MYcl9PtyE+ghI
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-