General
-
Target
Techsmith_Products_Hook_-_Jasi2169.rar
-
Size
6.6MB
-
Sample
240522-j7c7wahc86
-
MD5
199171763bcb8aa2763d2b2413dae394
-
SHA1
3168b51a59c1d0b1a6725186f591ee9bb017ef46
-
SHA256
d5a200c34505465d309415de2c0b78b3f7e15e0d07583412eca72e7685ab28c9
-
SHA512
b76e219b1e5fe068127451d9f3c8f9e4fd47cb0f20a95088e57c2bc232f0190c86590fa2fdf087efa0e03c14ff8c25a5e375e9bd0d135aa629ae74ddee4b0cc5
-
SSDEEP
98304:8MEkb8R8sRn1dbyyPrhbCRLMJoExRYCGOdIdT84+zmGNEI1CjPe81Qj:8MEtR9nvnPr2Q/xCFdA4IX2281Qj
Behavioral task
behavioral1
Sample
Jasi2169 NFO Viewer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Techsmith Camtasia Hook/winmm.dll
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
Jasi2169 NFO Viewer.exe
-
Size
152KB
-
MD5
19fe0a06003b2cc9c702a50824199521
-
SHA1
6b2005c9e4b8a9376e3ddedc276753c66485d8c1
-
SHA256
70e3eb2cd8520261275ba73c70f003cbecd1d4b35466ec74d9678472aca72344
-
SHA512
d50ab88999e60ce75a7c34a0db4c816adf89e72f2a1583e74991dceb68205d4d1e8bbefb3c501f211190118328bdc32a68fa72815c562a906dbed94b59af4fcb
-
SSDEEP
3072:TFcS5icufP7afBrG+OcHgFmKfs1Q0WsDL2sYnW+8ToLphLoimt8Y:RXqyB6bcHOm+s+0WsDis6XLHa8
Score7/10-
Loads dropped DLL
-
-
-
Target
Techsmith Camtasia Hook/winmm.dll
-
Size
3.3MB
-
MD5
65fbcfeeeb2349543b40852a071a57af
-
SHA1
55e725af29707b5fc2e6223eb7221a48119e22c6
-
SHA256
47e1ca2cc1f871a61341f4db4cb825713f1526aca645f8437153c537e6b4772c
-
SHA512
298b9b354611a835f6a818fccc5f5b5e68b423a013e45d804e595d02e9284f45136437372c8581602bc2c42c57cd71e79a308d9614cac0601e086368910aaa2f
-
SSDEEP
49152:wyeiKWFQRV+/Lvmf1pH4oaOdHoNIY97d84+Uyxm2nAcxm1Sk+VCG/1+P8X81Q0:wRYCGOdIdT84+zmGNEI1CjPe81Q
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Techsmith Snagit Hook/version.dll
-
Size
3.2MB
-
MD5
e32b1f323bf7a3a5c5eb0a2db0b82997
-
SHA1
e2a8ef2f9ad9a8383491c7d028c5efd6f040e39a
-
SHA256
b265f9a80ae5f265fcf008f2e8f9152023764beb02a8bd4d60573f532c25a161
-
SHA512
dcd3db19ff00ecd2b95791b115f24d63bc44694cc08002762cdb9e2f2f1324e7876e1855dbd777174a58a6e3bd14df344d4831d35382fcdb104a59a1b0804bbc
-
SSDEEP
49152:DMfqbkbDIRKbsjW2IOmyee1db/eeWyf37vEsbkvRLcy3uDN5MGTMfHMw:DMEkb8R8sRn1dbyyPrhbCRLMJoE
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-