General
-
Target
n.exe
-
Size
4.7MB
-
Sample
240611-hfvr6sycrp
-
MD5
79ffc0a288862e26114769a9cd736bf5
-
SHA1
1434ad3050d1204987161d271c52448635bbf833
-
SHA256
c0065563c6c85946730ef077b9fb3820cfe59e19f50eee259a60647a56fcb6f3
-
SHA512
a404d4b459703b5b935e2231a2223bc89a94f1438f365335c634ba97b82bdb9c292875673903415c7d0979514d8868ec1a418fd021709dfffb5928b78bfc0c80
-
SSDEEP
98304:nOWLgD7YVuw0r50diU2Ea6UibMs7IqqCr4BK24G+:/8suj0dJa0AsnqC0l
Static task
static1
Behavioral task
behavioral1
Sample
n.exe
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
n.exe
-
Size
4.7MB
-
MD5
79ffc0a288862e26114769a9cd736bf5
-
SHA1
1434ad3050d1204987161d271c52448635bbf833
-
SHA256
c0065563c6c85946730ef077b9fb3820cfe59e19f50eee259a60647a56fcb6f3
-
SHA512
a404d4b459703b5b935e2231a2223bc89a94f1438f365335c634ba97b82bdb9c292875673903415c7d0979514d8868ec1a418fd021709dfffb5928b78bfc0c80
-
SSDEEP
98304:nOWLgD7YVuw0r50diU2Ea6UibMs7IqqCr4BK24G+:/8suj0dJa0AsnqC0l
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-