General
-
Target
suspal.exe
-
Size
15.1MB
-
Sample
241003-at3qyaydph
-
MD5
0a248e00d9f3999b03c8353ec80ab8e9
-
SHA1
e3a5b0a07cf077bdffc44fe0c29b8ef32d832126
-
SHA256
fe04f4bf0e57120148e49b67e1860f329f3ce5aade47f05e7c8a1d64e1816dca
-
SHA512
4762495bce3e8d7e2806208aad69dccb7d7f7545df581050142579f60fa7ee986141fd12dbef89c64544b07311dd87430a91a606d4751077840b19b3af92ba6e
-
SSDEEP
393216:FTMPFy6utYG43mbtgsAQxQX3OBkTEzhMJCM8J:9MPI6ua3vsEOBkTCYK
Behavioral task
behavioral1
Sample
suspal.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
suspal.exe
-
Size
15.1MB
-
MD5
0a248e00d9f3999b03c8353ec80ab8e9
-
SHA1
e3a5b0a07cf077bdffc44fe0c29b8ef32d832126
-
SHA256
fe04f4bf0e57120148e49b67e1860f329f3ce5aade47f05e7c8a1d64e1816dca
-
SHA512
4762495bce3e8d7e2806208aad69dccb7d7f7545df581050142579f60fa7ee986141fd12dbef89c64544b07311dd87430a91a606d4751077840b19b3af92ba6e
-
SSDEEP
393216:FTMPFy6utYG43mbtgsAQxQX3OBkTEzhMJCM8J:9MPI6ua3vsEOBkTCYK
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-