General
-
Target
d6dfdb332623e9be79855681dd84c8234174ba900c93970d8574523516b11aeb
-
Size
5.3MB
-
Sample
240526-fnttqsfh3y
-
MD5
4439dea6e261e089e18103c9ffd48541
-
SHA1
63c49802bc7f338cb0a5fd3a0d29d6a88c6f251d
-
SHA256
d6dfdb332623e9be79855681dd84c8234174ba900c93970d8574523516b11aeb
-
SHA512
38527c707bfd2dbe33064bdbcd59db62e445461e2475e9dfe3026bf232eb37a3a6d185f3244c29fd30f69deb2c46cb04ffa7dff618a40e4bad6ea4b8ecbfe32b
-
SSDEEP
98304:GN/SSxn5D1cKNn1q5hwtiC5exhnSH2nLlalo/iwd9xaEDHr9gfrXx36T:GN/SoVNtA59Vjiwd9xaEDHrYrB3E
Static task
static1
Behavioral task
behavioral1
Sample
d6dfdb332623e9be79855681dd84c8234174ba900c93970d8574523516b11aeb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d6dfdb332623e9be79855681dd84c8234174ba900c93970d8574523516b11aeb.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
d6dfdb332623e9be79855681dd84c8234174ba900c93970d8574523516b11aeb
-
Size
5.3MB
-
MD5
4439dea6e261e089e18103c9ffd48541
-
SHA1
63c49802bc7f338cb0a5fd3a0d29d6a88c6f251d
-
SHA256
d6dfdb332623e9be79855681dd84c8234174ba900c93970d8574523516b11aeb
-
SHA512
38527c707bfd2dbe33064bdbcd59db62e445461e2475e9dfe3026bf232eb37a3a6d185f3244c29fd30f69deb2c46cb04ffa7dff618a40e4bad6ea4b8ecbfe32b
-
SSDEEP
98304:GN/SSxn5D1cKNn1q5hwtiC5exhnSH2nLlalo/iwd9xaEDHr9gfrXx36T:GN/SoVNtA59Vjiwd9xaEDHrYrB3E
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-