General
-
Target
loader.exe
-
Size
18.2MB
-
Sample
240223-fdypyabb3t
-
MD5
7fbfd9d3c34163e491c5cbd6eca5fed8
-
SHA1
9e463d614de4fbfcd6dcbb9a9197206f4ecc093d
-
SHA256
299e80bd26e90de2dcf94b5b59aff4201a74acfc1bf2c325847b0124d8583073
-
SHA512
3829acbbe82cb5f6e2f83d86788a260596fc43808311c12713b2bf4503849e8328f2cea7a90e6ebc79d9b57cc9f91aa2402e160913ae8ff9fcee82e0f11c42ce
-
SSDEEP
393216:g4frAQhfTmIce0En1DVfN+VwkuveZKkwpvGn4XpmDRx7csDSpLXHwEAstdo3/W:l0Mmh/E1DVfNyuve4tpvGn8q79OpUstL
Malware Config
Targets
-
-
Target
loader.exe
-
Size
18.2MB
-
MD5
7fbfd9d3c34163e491c5cbd6eca5fed8
-
SHA1
9e463d614de4fbfcd6dcbb9a9197206f4ecc093d
-
SHA256
299e80bd26e90de2dcf94b5b59aff4201a74acfc1bf2c325847b0124d8583073
-
SHA512
3829acbbe82cb5f6e2f83d86788a260596fc43808311c12713b2bf4503849e8328f2cea7a90e6ebc79d9b57cc9f91aa2402e160913ae8ff9fcee82e0f11c42ce
-
SSDEEP
393216:g4frAQhfTmIce0En1DVfN+VwkuveZKkwpvGn4XpmDRx7csDSpLXHwEAstdo3/W:l0Mmh/E1DVfNyuve4tpvGn8q79OpUstL
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-