General
-
Target
92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63
-
Size
5.0MB
-
Sample
240523-xvhhqach4x
-
MD5
d97ff1102e8ba106596d50a100021b9f
-
SHA1
a9484405b91d2b0e19f845b85516d88e271b5184
-
SHA256
92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63
-
SHA512
05d055943264b1bab63127ff90edaa6a0cf7ef69282739d0466df4bd015abcc5531910896a0f93e67aa24689e1af4010dbd5e6b3793039bf0da08a6b77887fff
-
SSDEEP
98304:D+HVb4W8Qh49un3vR3riSm+NJSBGwd43W9FRq:D+HJ8C49O/RHNJSEDiFw
Static task
static1
Behavioral task
behavioral1
Sample
92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63
-
Size
5.0MB
-
MD5
d97ff1102e8ba106596d50a100021b9f
-
SHA1
a9484405b91d2b0e19f845b85516d88e271b5184
-
SHA256
92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63
-
SHA512
05d055943264b1bab63127ff90edaa6a0cf7ef69282739d0466df4bd015abcc5531910896a0f93e67aa24689e1af4010dbd5e6b3793039bf0da08a6b77887fff
-
SSDEEP
98304:D+HVb4W8Qh49un3vR3riSm+NJSBGwd43W9FRq:D+HJ8C49O/RHNJSEDiFw
-
Detect Blackmoon payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-