General
-
Target
49d00fdd4f022da0c2c88062d805c9b810520cf94cd50b575956b94c7e0587cd
-
Size
5.8MB
-
Sample
240911-p7naqs1fqn
-
MD5
9c303558c5726754082bc64ed80f05c8
-
SHA1
26a29e9797efcbf5614c0ef4bbeddbbdb2cf1b78
-
SHA256
49d00fdd4f022da0c2c88062d805c9b810520cf94cd50b575956b94c7e0587cd
-
SHA512
dc11551654d53ac8010c0cb6dc37fd42116f791524aa076c1d260e66d2b8dad7ef932061de5d4c68045a230ec6a32356c5554ca5cb694495f97601da96d7e1ad
-
SSDEEP
98304:a6oG3V1aidUiGcCSi3h4i4Ulbgg+puwW4lKLKgPSBMHYMM54ZB8/+vlYfpnGnd7u:fpeidLDCBxf1l7+putPSBMHYMnB0+tYf
Behavioral task
behavioral1
Sample
49d00fdd4f022da0c2c88062d805c9b810520cf94cd50b575956b94c7e0587cd.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
49d00fdd4f022da0c2c88062d805c9b810520cf94cd50b575956b94c7e0587cd
-
Size
5.8MB
-
MD5
9c303558c5726754082bc64ed80f05c8
-
SHA1
26a29e9797efcbf5614c0ef4bbeddbbdb2cf1b78
-
SHA256
49d00fdd4f022da0c2c88062d805c9b810520cf94cd50b575956b94c7e0587cd
-
SHA512
dc11551654d53ac8010c0cb6dc37fd42116f791524aa076c1d260e66d2b8dad7ef932061de5d4c68045a230ec6a32356c5554ca5cb694495f97601da96d7e1ad
-
SSDEEP
98304:a6oG3V1aidUiGcCSi3h4i4Ulbgg+puwW4lKLKgPSBMHYMM54ZB8/+vlYfpnGnd7u:fpeidLDCBxf1l7+putPSBMHYMnB0+tYf
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-