General
-
Target
UBGG Internal.exe
-
Size
6.3MB
-
Sample
240608-garmwshd9z
-
MD5
d4e1dc6dd9095039646485bdb5b2a452
-
SHA1
b50fd8a91e5203aa52cd8ebfa55a69705fc1af9c
-
SHA256
fe4bf4127f90432d512fd211363d59f552c6741bc4625a08bca9ac2c89b86ea9
-
SHA512
556afcfb8424a2b3ca783e199ec1958e0171bbfc0d633da8b264fc42506bedda8ad393a5c266b190e2c47ab8039993e90f561d4f5995c80862002296ed26e530
-
SSDEEP
98304:mtsSlQpwe40HXnEshBljnOgV2hcOwSfvfhk2MfYDY1GgOw9c41VBji0ChmpP/:mVQpdXHXnnhNV2hcDKXhV+UYJO8c8fn
Behavioral task
behavioral1
Sample
UBGG Internal.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
UBGG Internal.exe
-
Size
6.3MB
-
MD5
d4e1dc6dd9095039646485bdb5b2a452
-
SHA1
b50fd8a91e5203aa52cd8ebfa55a69705fc1af9c
-
SHA256
fe4bf4127f90432d512fd211363d59f552c6741bc4625a08bca9ac2c89b86ea9
-
SHA512
556afcfb8424a2b3ca783e199ec1958e0171bbfc0d633da8b264fc42506bedda8ad393a5c266b190e2c47ab8039993e90f561d4f5995c80862002296ed26e530
-
SSDEEP
98304:mtsSlQpwe40HXnEshBljnOgV2hcOwSfvfhk2MfYDY1GgOw9c41VBji0ChmpP/:mVQpdXHXnnhNV2hcDKXhV+UYJO8c8fn
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-