General
-
Target
WW-Unlock-All.exe
-
Size
37.0MB
-
Sample
240525-brh47ahh32
-
MD5
aa4776a1f805e24a8d3a5a4f40f2c4ad
-
SHA1
33059aa20fb3fe4e63060ec0522f2ef6b92e8037
-
SHA256
d58317aa45038dba12f984acf330e8b320fd02acc7dae2dbb3d552abf57378e7
-
SHA512
08b3673e89bca857ad47edaadfe6f2df0152256e83dfe058cf9b7c4f8c9397173a95cf33bc571cf9377c2b56347272231ab970b77a57ff8865f9b44ae73c4c64
-
SSDEEP
786432:GPOf6psATJ9Udzg5TwLoIe3ODPK5tBRTwhdknCi/tQ47TNx:GPOfWsAdSdzGELoIejrnwrk7/tQ4n
Static task
static1
Behavioral task
behavioral1
Sample
WW-Unlock-All.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WW-Unlock-All.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
WW-Unlock-All.exe
-
Size
37.0MB
-
MD5
aa4776a1f805e24a8d3a5a4f40f2c4ad
-
SHA1
33059aa20fb3fe4e63060ec0522f2ef6b92e8037
-
SHA256
d58317aa45038dba12f984acf330e8b320fd02acc7dae2dbb3d552abf57378e7
-
SHA512
08b3673e89bca857ad47edaadfe6f2df0152256e83dfe058cf9b7c4f8c9397173a95cf33bc571cf9377c2b56347272231ab970b77a57ff8865f9b44ae73c4c64
-
SSDEEP
786432:GPOf6psATJ9Udzg5TwLoIe3ODPK5tBRTwhdknCi/tQ47TNx:GPOfWsAdSdzGELoIejrnwrk7/tQ4n
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-