General
-
Target
5138efa2c04e078f04899b61caa4dc023063c63e1f1f11d5cbe7d4c50dffb4a2
-
Size
11.3MB
-
Sample
240526-shsqpsbd65
-
MD5
6b3d7ce072e58f48035ef68a86db06bd
-
SHA1
540c575b889ddc1476f2d5c0ac16d6daf13dae82
-
SHA256
5138efa2c04e078f04899b61caa4dc023063c63e1f1f11d5cbe7d4c50dffb4a2
-
SHA512
033fef324ad7b1f01438a9614f07c6683f5fc744ea21792e1a7027181b0a2e815651c8099f65c8d5cb9cdadc32ad82575d20d00631a5fd1ee07902189b9203ed
-
SSDEEP
196608:FzsASlxZ/+8oYnMB9nJ5G4GZpMo2DWRqRnagy2+a64blJH8KEdZ9/qCQ90htMJYo:FzHwZ2rBBzG4sprkWgBjXb3H6Z9690Tx
Static task
static1
Behavioral task
behavioral1
Sample
5138efa2c04e078f04899b61caa4dc023063c63e1f1f11d5cbe7d4c50dffb4a2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5138efa2c04e078f04899b61caa4dc023063c63e1f1f11d5cbe7d4c50dffb4a2.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
5138efa2c04e078f04899b61caa4dc023063c63e1f1f11d5cbe7d4c50dffb4a2
-
Size
11.3MB
-
MD5
6b3d7ce072e58f48035ef68a86db06bd
-
SHA1
540c575b889ddc1476f2d5c0ac16d6daf13dae82
-
SHA256
5138efa2c04e078f04899b61caa4dc023063c63e1f1f11d5cbe7d4c50dffb4a2
-
SHA512
033fef324ad7b1f01438a9614f07c6683f5fc744ea21792e1a7027181b0a2e815651c8099f65c8d5cb9cdadc32ad82575d20d00631a5fd1ee07902189b9203ed
-
SSDEEP
196608:FzsASlxZ/+8oYnMB9nJ5G4GZpMo2DWRqRnagy2+a64blJH8KEdZ9/qCQ90htMJYo:FzHwZ2rBBzG4sprkWgBjXb3H6Z9690Tx
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-