General
-
Target
vax loader_protected.exe
-
Size
2.8MB
-
Sample
240822-pgalysyhpr
-
MD5
78acdef46270d9b357032e0050752c50
-
SHA1
d5ae2895b3855b634406a2afc8ddda83c2b2fec6
-
SHA256
b89ca81fe6a92e47a8587732ba500132345d187972d825ca70d18191cb61f36a
-
SHA512
48fa74be027f95f40d74fc94e8d62b39ed12ec3403b5e6c0782a40c5a737f42da3ede4ef9e168bc6fcc842e11c1c31bea5d43a12d991aab346a559b06e83a8ca
-
SSDEEP
49152:U5jjZUvK1KnoWpI7I1oE/KsOAC12pgeClroU9M+9kN4k8JDj8R4Q1cUWS:UjZU2x+R/I2qtNoU9M9N4FJDjMZ6w
Malware Config
Targets
-
-
Target
vax loader_protected.exe
-
Size
2.8MB
-
MD5
78acdef46270d9b357032e0050752c50
-
SHA1
d5ae2895b3855b634406a2afc8ddda83c2b2fec6
-
SHA256
b89ca81fe6a92e47a8587732ba500132345d187972d825ca70d18191cb61f36a
-
SHA512
48fa74be027f95f40d74fc94e8d62b39ed12ec3403b5e6c0782a40c5a737f42da3ede4ef9e168bc6fcc842e11c1c31bea5d43a12d991aab346a559b06e83a8ca
-
SSDEEP
49152:U5jjZUvK1KnoWpI7I1oE/KsOAC12pgeClroU9M+9kN4k8JDj8R4Q1cUWS:UjZU2x+R/I2qtNoU9M9N4FJDjMZ6w
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-