General
-
Target
loader.exe
-
Size
4.8MB
-
Sample
240611-gbxkjaxblj
-
MD5
29f96a824141fe7a04589b67ee53edec
-
SHA1
bda00deeef354a6197cd5d2a9a56a93d2ffba917
-
SHA256
583c0e4cf4d95053c2ef79ccb19894837a104b9dfa5d65a80113d17633ff0fa6
-
SHA512
223e21c5f21c59dca00a17f76e26480d3f516482001ed75bb76f305ec3be9d75dc418366a3f475119d89751acead3081e33de5570d5e637ec05e0a6efff21c30
-
SSDEEP
98304:W1jRkfKsLdVIKicKe3Qj2Ya36Ve0gMkUeDbHa4z6/wEsga3xXk:KRkfKsLBt3QjyFzMkVDbH3z6jay
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
loader.exe
-
Size
4.8MB
-
MD5
29f96a824141fe7a04589b67ee53edec
-
SHA1
bda00deeef354a6197cd5d2a9a56a93d2ffba917
-
SHA256
583c0e4cf4d95053c2ef79ccb19894837a104b9dfa5d65a80113d17633ff0fa6
-
SHA512
223e21c5f21c59dca00a17f76e26480d3f516482001ed75bb76f305ec3be9d75dc418366a3f475119d89751acead3081e33de5570d5e637ec05e0a6efff21c30
-
SSDEEP
98304:W1jRkfKsLdVIKicKe3Qj2Ya36Ve0gMkUeDbHa4z6/wEsga3xXk:KRkfKsLBt3QjyFzMkVDbH3z6jay
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-