General
-
Target
9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a
-
Size
9.8MB
-
Sample
241031-j7arravdrk
-
MD5
ffec6ce9f5f9534086076195e95eefa3
-
SHA1
0020fa2285a9bae44ebf4f856116d9ce7df66881
-
SHA256
9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a
-
SHA512
6b37a0d62828634bd2b73ecb8b941b24e282966285ec96a93abe04159e6cb287449ef45fa0361dfc0d40e337d7400702a7bc46faa94b8d4cad261551090067f8
-
SSDEEP
196608:oA74Kf5o0+HhRGI6lhOv4mNp//e+cVJc8tfR3ZE+S:oUqhkI6lhZmjZcVJBBZc
Static task
static1
Behavioral task
behavioral1
Sample
9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a
-
Size
9.8MB
-
MD5
ffec6ce9f5f9534086076195e95eefa3
-
SHA1
0020fa2285a9bae44ebf4f856116d9ce7df66881
-
SHA256
9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a
-
SHA512
6b37a0d62828634bd2b73ecb8b941b24e282966285ec96a93abe04159e6cb287449ef45fa0361dfc0d40e337d7400702a7bc46faa94b8d4cad261551090067f8
-
SSDEEP
196608:oA74Kf5o0+HhRGI6lhOv4mNp//e+cVJc8tfR3ZE+S:oUqhkI6lhZmjZcVJBBZc
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-