General
-
Target
7b0ac8fec2e04bfbb8c42cb0944bf89de8c336d3916cd4e86f0f98f1a4659c77
-
Size
3.5MB
-
Sample
240903-1f7qvaxfpn
-
MD5
e9f15d6976cc2201bfba5d4781ce1a69
-
SHA1
519e3aeda6b0952cecf9d333f7e08cee7aa8c2f0
-
SHA256
7b0ac8fec2e04bfbb8c42cb0944bf89de8c336d3916cd4e86f0f98f1a4659c77
-
SHA512
5c41f4c90a4c2dea8eb38a91c563b1202d3b8988c3fe913dee5da6def7eae21a14f86ea19986cf25832ef25dce222707cccad6914af785946a2b010df93ab3f8
-
SSDEEP
98304:R50hdB4b2ljDFfMEV5cZHd2bOoup86unPBE:v0hDljDFME2uOC
Static task
static1
Behavioral task
behavioral1
Sample
7b0ac8fec2e04bfbb8c42cb0944bf89de8c336d3916cd4e86f0f98f1a4659c77.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7b0ac8fec2e04bfbb8c42cb0944bf89de8c336d3916cd4e86f0f98f1a4659c77.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
7b0ac8fec2e04bfbb8c42cb0944bf89de8c336d3916cd4e86f0f98f1a4659c77
-
Size
3.5MB
-
MD5
e9f15d6976cc2201bfba5d4781ce1a69
-
SHA1
519e3aeda6b0952cecf9d333f7e08cee7aa8c2f0
-
SHA256
7b0ac8fec2e04bfbb8c42cb0944bf89de8c336d3916cd4e86f0f98f1a4659c77
-
SHA512
5c41f4c90a4c2dea8eb38a91c563b1202d3b8988c3fe913dee5da6def7eae21a14f86ea19986cf25832ef25dce222707cccad6914af785946a2b010df93ab3f8
-
SSDEEP
98304:R50hdB4b2ljDFfMEV5cZHd2bOoup86unPBE:v0hDljDFME2uOC
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-