General
-
Target
vector (1).exe
-
Size
11.1MB
-
Sample
240423-2yxh9sce7v
-
MD5
3ef1654c6e052d2c63701e75523d1842
-
SHA1
1bd9f3d84f66c195cb7db9493505c1077f5dbb79
-
SHA256
4507e2eb2009e8d37b8d3e8b2409c55dbff74a5ca0ef6e54bcb9ca58b2be0c45
-
SHA512
e47cbf22e1b664301d82b9f8dc49a8407d7bbb755b8aded506c8e265236af1ddbf355be2ad7d89cb9130230e225de1c54a5dc647ec314b6b01fe090813a8a582
-
SSDEEP
196608:HvDt7UZ0uVNRfCKopUs5aYtcIeN5VHPLGGmIheqHc8b8eB:H71bOrxoispqX9LFmINc8r
Behavioral task
behavioral1
Sample
vector (1).exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
vector (1).exe
-
Size
11.1MB
-
MD5
3ef1654c6e052d2c63701e75523d1842
-
SHA1
1bd9f3d84f66c195cb7db9493505c1077f5dbb79
-
SHA256
4507e2eb2009e8d37b8d3e8b2409c55dbff74a5ca0ef6e54bcb9ca58b2be0c45
-
SHA512
e47cbf22e1b664301d82b9f8dc49a8407d7bbb755b8aded506c8e265236af1ddbf355be2ad7d89cb9130230e225de1c54a5dc647ec314b6b01fe090813a8a582
-
SSDEEP
196608:HvDt7UZ0uVNRfCKopUs5aYtcIeN5VHPLGGmIheqHc8b8eB:H71bOrxoispqX9LFmINc8r
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies Installed Components in the registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-