General
-
Target
solaris.exe
-
Size
4.0MB
-
Sample
240408-rychzsbe27
-
MD5
fc96201d8917ab094815a9266eeab37c
-
SHA1
f01c72437a8b97fbe241fc13210090ef780b7fd8
-
SHA256
a1be1621b0c700d52efad5a9a16538adf7fe54835070ca34e2b7f28dc981c0f9
-
SHA512
8d35494f0008e25fc21acfbf2eafa2382a4f306ba0e089bed178e4a35e2c8a53501de662bfd5bb7bc5e28876be2ab9b6c352be6e6d2f6b510dfa72715e4f4ad6
-
SSDEEP
98304:4BALfa0y8XshRtIPS2CVoa/rl9O7cvrsGKi0:rflXsIPXCtrf5Dsbi0
Behavioral task
behavioral1
Sample
solaris.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
solaris.exe
-
Size
4.0MB
-
MD5
fc96201d8917ab094815a9266eeab37c
-
SHA1
f01c72437a8b97fbe241fc13210090ef780b7fd8
-
SHA256
a1be1621b0c700d52efad5a9a16538adf7fe54835070ca34e2b7f28dc981c0f9
-
SHA512
8d35494f0008e25fc21acfbf2eafa2382a4f306ba0e089bed178e4a35e2c8a53501de662bfd5bb7bc5e28876be2ab9b6c352be6e6d2f6b510dfa72715e4f4ad6
-
SSDEEP
98304:4BALfa0y8XshRtIPS2CVoa/rl9O7cvrsGKi0:rflXsIPXCtrf5Dsbi0
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-