General
-
Target
Loader (3).exe
-
Size
13.3MB
-
Sample
240703-p4bsjawejc
-
MD5
d3567c93fb7a218ad130542ac8b02a76
-
SHA1
e0f2e65b0eab58da6c26de403933ed6e22c0c364
-
SHA256
7f19b0c0bc1ce4ce7b0bd072527f2feade5809d8de040c01945737534502a4de
-
SHA512
a245ff8e8e6843298159ae207866df7f840865f02ac7c813faa9b7a5b1740b2b9bde496e98dc413f12597e96c5c8c62fde4845a774d904eb089070d80498be04
-
SSDEEP
196608:YTYz2RUiumFCR0F29+AFB1Au21QUhX2nUMhjIhK/gVCPxWrJerBtZEmla:EYz2RR69+an9WaUioVCPoozZN8
Static task
static1
Behavioral task
behavioral1
Sample
Loader (3).exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Loader (3).exe
-
Size
13.3MB
-
MD5
d3567c93fb7a218ad130542ac8b02a76
-
SHA1
e0f2e65b0eab58da6c26de403933ed6e22c0c364
-
SHA256
7f19b0c0bc1ce4ce7b0bd072527f2feade5809d8de040c01945737534502a4de
-
SHA512
a245ff8e8e6843298159ae207866df7f840865f02ac7c813faa9b7a5b1740b2b9bde496e98dc413f12597e96c5c8c62fde4845a774d904eb089070d80498be04
-
SSDEEP
196608:YTYz2RUiumFCR0F29+AFB1Au21QUhX2nUMhjIhK/gVCPxWrJerBtZEmla:EYz2RR69+an9WaUioVCPoozZN8
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-