General
-
Target
HorizonCAM.exe
-
Size
3.6MB
-
Sample
240329-qtjk3aac86
-
MD5
535796223a4916e5cda031b45e7419f4
-
SHA1
c62539e3530670b15aab190c837729174423492a
-
SHA256
7c1680db46577d316bf0adf1237355b9ae5b0f71099d5ffa18276925c52ff12c
-
SHA512
a3dab1152c2af28344db37f20abf3ed6bfd5689cfa22ff6692bc920f0bf5193c86f6fb68068fff656c302d5e8e23377f889ea96034017d42e667273515303003
-
SSDEEP
98304:yswilhhi40mSaRn0EYEtB9jOEqkfx/Hp+rFNPKG:ylQi40mTRwEf9KEqkfx8rFr
Behavioral task
behavioral1
Sample
HorizonCAM.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
HorizonCAM.exe
-
Size
3.6MB
-
MD5
535796223a4916e5cda031b45e7419f4
-
SHA1
c62539e3530670b15aab190c837729174423492a
-
SHA256
7c1680db46577d316bf0adf1237355b9ae5b0f71099d5ffa18276925c52ff12c
-
SHA512
a3dab1152c2af28344db37f20abf3ed6bfd5689cfa22ff6692bc920f0bf5193c86f6fb68068fff656c302d5e8e23377f889ea96034017d42e667273515303003
-
SSDEEP
98304:yswilhhi40mSaRn0EYEtB9jOEqkfx/Hp+rFNPKG:ylQi40mTRwEf9KEqkfx8rFr
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-