General
-
Target
wave_bypass.exe
-
Size
25.6MB
-
Sample
240812-flwkjswflr
-
MD5
bb86d90e6f8a455a3de78ab876f915d1
-
SHA1
6e216c2c17c066831c3a663d2c194cccc8799795
-
SHA256
3251be108d2d1034710276af57fa4dd96692cd3cf9f0b3e9045528a4f32cb775
-
SHA512
2be3bf5270a7a8516af9f3836eb82f5b74b82da52be581cf122f4d3f35bebee32c0782001f3e4475452f3f47c140cd8dd3f355be24d59cf50fb98049d6f8e757
-
SSDEEP
393216:HitBxmzN05GC7NSSjMKKBe7gpEgc/s0WVGwGAd4G+JH5GE5p3BmGHgsh+SwlcxV1:mBFjxjHgrZjzdKHcEtb7MJt8r
Behavioral task
behavioral1
Sample
wave_bypass.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
wave_bypass.exe
-
Size
25.6MB
-
MD5
bb86d90e6f8a455a3de78ab876f915d1
-
SHA1
6e216c2c17c066831c3a663d2c194cccc8799795
-
SHA256
3251be108d2d1034710276af57fa4dd96692cd3cf9f0b3e9045528a4f32cb775
-
SHA512
2be3bf5270a7a8516af9f3836eb82f5b74b82da52be581cf122f4d3f35bebee32c0782001f3e4475452f3f47c140cd8dd3f355be24d59cf50fb98049d6f8e757
-
SSDEEP
393216:HitBxmzN05GC7NSSjMKKBe7gpEgc/s0WVGwGAd4G+JH5GE5p3BmGHgsh+SwlcxV1:mBFjxjHgrZjzdKHcEtb7MJt8r
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-