General
-
Target
Electron
-
Size
14KB
-
Sample
240312-mp7wbaeh5y
-
MD5
0dcf64dc0f873b1d5cb1976800bc4f45
-
SHA1
b254cf4c964db79806a9315684ce81eeb1341f7c
-
SHA256
10ab7cb1f689ec859be78ee02b4314b3300e490d566ee7e3ca2148dd68b56690
-
SHA512
62ef61a544c4b208ff1bfb8dcf007376f37a064482c77afd2c515719787ba416ad903bf9d06afea8b514d8f0581beda340cc4499fafaf29f9bc8c9bfd26d97a9
-
SSDEEP
384:ve9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSiZ7AH:vwTilUlC9fvOflS5/u01/8xWApJingq/
Static task
static1
Behavioral task
behavioral1
Sample
Electron.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Electron.html
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
Electron
-
Size
14KB
-
MD5
0dcf64dc0f873b1d5cb1976800bc4f45
-
SHA1
b254cf4c964db79806a9315684ce81eeb1341f7c
-
SHA256
10ab7cb1f689ec859be78ee02b4314b3300e490d566ee7e3ca2148dd68b56690
-
SHA512
62ef61a544c4b208ff1bfb8dcf007376f37a064482c77afd2c515719787ba416ad903bf9d06afea8b514d8f0581beda340cc4499fafaf29f9bc8c9bfd26d97a9
-
SSDEEP
384:ve9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSiZ7AH:vwTilUlC9fvOflS5/u01/8xWApJingq/
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-