General
-
Target
Yusei.cc Temp.exe
-
Size
3.3MB
-
Sample
240710-z1eecszfmr
-
MD5
28bdaf7f5ff28ae8e20569c971e72691
-
SHA1
33a41b837f2a30b113407cb299cc72bdb33f3196
-
SHA256
0141cb91e5cb0e7e2dacc2559cbeb34feda7464d37bfda2e71c4d4c9a8ca75c5
-
SHA512
4a3fc5acaa8d0a99c77a31d0a7d266ba17649038f085c7ffde067e56453850635928e7a12a90049bad7598a62031f8327fb0972001c2649897d197b376f88164
-
SSDEEP
98304:dbtRsknzDojeQxGg03SlJRYi/iDvP4ct89YpzBR:d3rzDo0+JGEyvP4B9QzBR
Behavioral task
behavioral1
Sample
Yusei.cc Temp.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
Yusei.cc Temp.exe
-
Size
3.3MB
-
MD5
28bdaf7f5ff28ae8e20569c971e72691
-
SHA1
33a41b837f2a30b113407cb299cc72bdb33f3196
-
SHA256
0141cb91e5cb0e7e2dacc2559cbeb34feda7464d37bfda2e71c4d4c9a8ca75c5
-
SHA512
4a3fc5acaa8d0a99c77a31d0a7d266ba17649038f085c7ffde067e56453850635928e7a12a90049bad7598a62031f8327fb0972001c2649897d197b376f88164
-
SSDEEP
98304:dbtRsknzDojeQxGg03SlJRYi/iDvP4ct89YpzBR:d3rzDo0+JGEyvP4B9QzBR
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-