General
-
Target
2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9.zip
-
Size
5.3MB
-
Sample
240506-hmjcqacf3v
-
MD5
fdd2ab31f489385c0234bf0da7a8d2e1
-
SHA1
0537b6d52daccee17715be83c4b16d10080838e5
-
SHA256
34392a29c9d024a79bb62977a79fcc1d6bbc611aa7001be19105620d2225d39e
-
SHA512
db1e8cb8680bcf2f35796ffe8c9d24109a514a95f43169a617c7d9e1e24a951e9aa824a215414e5e497b5be80165f92e3c71f297e4f2bc1bdebaef64905d9279
-
SSDEEP
98304:i6WngARM3untzZkOR6LwTzhI8qyM9aWAgCRI1aq3pTPg+c1SE2U7ZzRQTrOQ:/WgpuntFkOR6ezO84aWKRIh5TPgHh37m
Behavioral task
behavioral1
Sample
2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9
-
Size
5.3MB
-
MD5
11380a723c10152e806742510f6aa79c
-
SHA1
0a7ed414ae9a6442ab4830a6d35a531e408eb530
-
SHA256
2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9
-
SHA512
2196909b5922a2e319287aea910d15d74d923537bf54ea6cab102674b68a932d781c9cd2f6f051a8995f4ef9df0c098e9cff1c9e6a2a8c4271aa48efe6df4501
-
SSDEEP
98304:bLrhcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qo:vVg53HRVu7vHDpS1IqBRU7kCs2q
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Detect suspicious telegram bot
Detect suspicious telegram bot.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-