General
-
Target
SimuliaLicensePatcher.exe
-
Size
7.7MB
-
Sample
240430-r4ycmshc4x
-
MD5
4bca154d91fa2592f11f730988a106cd
-
SHA1
c244e509538a64f6e4ccd41d13b808f4f9bcda0b
-
SHA256
085e02519e34bbd0428bdc818ed5dc30fa987c4914f9b5bd9ca1b5e404fbf738
-
SHA512
d70cb3ba385dbda8a1b7a763aaa4c093f8f912e7bfb5d955b64cfcb34f6c280ab3a4d47acc59d4b67f9791f194b88bb9697d177b9aced8850e3bcde13bd00124
-
SSDEEP
196608:LytYizJjKD9Y4o5aBV2uzE0FQxidgM4RwZ+:mxe9UiVpZaIdMRp
Behavioral task
behavioral1
Sample
SimuliaLicensePatcher.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
SimuliaLicensePatcher.exe
-
Size
7.7MB
-
MD5
4bca154d91fa2592f11f730988a106cd
-
SHA1
c244e509538a64f6e4ccd41d13b808f4f9bcda0b
-
SHA256
085e02519e34bbd0428bdc818ed5dc30fa987c4914f9b5bd9ca1b5e404fbf738
-
SHA512
d70cb3ba385dbda8a1b7a763aaa4c093f8f912e7bfb5d955b64cfcb34f6c280ab3a4d47acc59d4b67f9791f194b88bb9697d177b9aced8850e3bcde13bd00124
-
SSDEEP
196608:LytYizJjKD9Y4o5aBV2uzE0FQxidgM4RwZ+:mxe9UiVpZaIdMRp
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-