General
-
Target
0XqHTML3yw.exe
-
Size
6.0MB
-
Sample
240719-ygkllazgkd
-
MD5
595ac58a31309a190242332224b38b0b
-
SHA1
685265c61aff806a26098c30fef95db188387b34
-
SHA256
153e20ccb9da08dc69c9f0c5152961384d81d17672efb5b62c37d791d5dd3811
-
SHA512
b926dbc9117bb0341b077412f99949b602c77df9943d0119cbdda7bfd58ec500faffb151c516581996fdcae614069b38f54fb71caf818bc59dd805c1fdc93fa0
-
SSDEEP
196608:7L8IJpu+zejziWhikMdV0ETcUtu8b3r9J:8IJpukoziWhK0icI3rz
Malware Config
Targets
-
-
Target
0XqHTML3yw.exe
-
Size
6.0MB
-
MD5
595ac58a31309a190242332224b38b0b
-
SHA1
685265c61aff806a26098c30fef95db188387b34
-
SHA256
153e20ccb9da08dc69c9f0c5152961384d81d17672efb5b62c37d791d5dd3811
-
SHA512
b926dbc9117bb0341b077412f99949b602c77df9943d0119cbdda7bfd58ec500faffb151c516581996fdcae614069b38f54fb71caf818bc59dd805c1fdc93fa0
-
SSDEEP
196608:7L8IJpu+zejziWhikMdV0ETcUtu8b3r9J:8IJpukoziWhK0icI3rz
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-