General
-
Target
c507dec437e09f01e4cf70dd85d478b1.zip
-
Size
5.1MB
-
Sample
240902-2zz1sazclq
-
MD5
fcf0c8853fcc03694ac92accc258df20
-
SHA1
cea2e245ed1fcc5fd04027ca619ca5edc420907b
-
SHA256
99b03d24ee07748e93d41bde9d4f617b9ed7cd0d9288ec0dee8199f5b981d3cf
-
SHA512
55d71bd88b267f3b007da656b715a2736da290189f9ac86ea5133a2629b899511dde4379fca8d59ce3d7cdee1dd7638fad76298f8ab958ec79f4496e93dc7dbe
-
SSDEEP
98304:47a0FW2ZLfbuyPfI38jKG3bd9DIDrJo2WjRmm79yxx5buSaTBHY8kN48e:47aY1TCwIsjHd9srsRmWQaL4te
Behavioral task
behavioral1
Sample
f16acceaef0ae8c24d8ed49928a0eab7b63bbfd11e13749d2b43321bd3c4f7cd.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
f16acceaef0ae8c24d8ed49928a0eab7b63bbfd11e13749d2b43321bd3c4f7cd
-
Size
5.1MB
-
MD5
c507dec437e09f01e4cf70dd85d478b1
-
SHA1
63e8e29b5be8cf19909afbefb0abb4888a024609
-
SHA256
f16acceaef0ae8c24d8ed49928a0eab7b63bbfd11e13749d2b43321bd3c4f7cd
-
SHA512
ace7e662c5edb18d0dbacbaaa189395e60ed6c27849d6718b5e841d69c4d4ae56ef25ad1ee498ffbd4441df28179623fe15a66bcbdb8c1fbee5a85a8ab2c63aa
-
SSDEEP
98304:/WiKgVlAGfphCCYtIiswQz+lmW92jzUO33P29nqhpDK4+:/W+lPqe73z+6P2A9KB
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-