General
-
Target
VenomWareMw3.exe
-
Size
5.5MB
-
Sample
240824-hk4kwazejm
-
MD5
6be3ee794060acc90ce9829944e1e63b
-
SHA1
fa7f13380ad91dee6a8899b5aa7771fbf93d136c
-
SHA256
0f683df9e909ae4398c6d946bb4002f8b583dd39abb5e5409f6177d683ad3151
-
SHA512
21428be15147690cae7670dafec64fc97b585f8c9365cc5ccdba0bdfdc128a96f528bdc561448f1ba58b847b25b94b213b68b65727ae366500e6712a71dc9c3b
-
SSDEEP
98304:ms0Xi9M1pUdzzJ36ptN1nEUojGs7JSNOkpr/84NZddGPkeTLAt4T84oin9:+Xi93dzzJgbEUoL7cN384XTGPkeTi4TD
Malware Config
Targets
-
-
Target
VenomWareMw3.exe
-
Size
5.5MB
-
MD5
6be3ee794060acc90ce9829944e1e63b
-
SHA1
fa7f13380ad91dee6a8899b5aa7771fbf93d136c
-
SHA256
0f683df9e909ae4398c6d946bb4002f8b583dd39abb5e5409f6177d683ad3151
-
SHA512
21428be15147690cae7670dafec64fc97b585f8c9365cc5ccdba0bdfdc128a96f528bdc561448f1ba58b847b25b94b213b68b65727ae366500e6712a71dc9c3b
-
SSDEEP
98304:ms0Xi9M1pUdzzJ36ptN1nEUojGs7JSNOkpr/84NZddGPkeTLAt4T84oin9:+Xi93dzzJgbEUoL7cN384XTGPkeTi4TD
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-