General
-
Target
95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9
-
Size
2.4MB
-
Sample
241006-af667s1gkg
-
MD5
64b707dff52a3fe4b1a1b52ed5494055
-
SHA1
dd9e47d9b5fbe73319cde692406014d9520eb520
-
SHA256
95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9
-
SHA512
7ba2b77b54e13f5db1f4a284f9c5aaa90325742a3ff751355f84d3e514e022fac1702554eecc3317e9fe40f703ea130ffd4acdda17a06e31fb0051920b32b8fc
-
SSDEEP
49152:oLKhNrl+LxMHBTnqHhbNFS9r7g2nSlKXTsJali+CU4Xp5JihRe:RDZ+NeqHhx0Vg2/Ibq4XEhRe
Static task
static1
Behavioral task
behavioral1
Sample
95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9
-
Size
2.4MB
-
MD5
64b707dff52a3fe4b1a1b52ed5494055
-
SHA1
dd9e47d9b5fbe73319cde692406014d9520eb520
-
SHA256
95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9
-
SHA512
7ba2b77b54e13f5db1f4a284f9c5aaa90325742a3ff751355f84d3e514e022fac1702554eecc3317e9fe40f703ea130ffd4acdda17a06e31fb0051920b32b8fc
-
SSDEEP
49152:oLKhNrl+LxMHBTnqHhbNFS9r7g2nSlKXTsJali+CU4Xp5JihRe:RDZ+NeqHhx0Vg2/Ibq4XEhRe
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-