General
-
Target
Akira_Clicker.exe
-
Size
8.3MB
-
Sample
241119-sk9r1axlez
-
MD5
5ceab1157735e1f04f8c3ddfec67711a
-
SHA1
864c6f6a2177c88b68582c8794715507ff3c17dd
-
SHA256
c73ca441ef581322524920065784e7da7431f693034eddabd7652b4915390580
-
SHA512
34cc2f48f8ed21876dfc9db49e10339dcc52a1afe62e947b1cbe4a00677158faf6ff5b1b5d84bacd17ea9d759ea68fa4f1e426f17eca40c3a3b58eb02e13ae75
-
SSDEEP
196608:X+ToyV0QhZ2VEJX/VHtlcjsVLZW+b04pcfpuNXMM:WVn/VHtGsVLZWacfpuxMM
Static task
static1
Behavioral task
behavioral1
Sample
Akira_Clicker.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
Akira_Clicker.exe
-
Size
8.3MB
-
MD5
5ceab1157735e1f04f8c3ddfec67711a
-
SHA1
864c6f6a2177c88b68582c8794715507ff3c17dd
-
SHA256
c73ca441ef581322524920065784e7da7431f693034eddabd7652b4915390580
-
SHA512
34cc2f48f8ed21876dfc9db49e10339dcc52a1afe62e947b1cbe4a00677158faf6ff5b1b5d84bacd17ea9d759ea68fa4f1e426f17eca40c3a3b58eb02e13ae75
-
SSDEEP
196608:X+ToyV0QhZ2VEJX/VHtlcjsVLZW+b04pcfpuNXMM:WVn/VHtGsVLZWacfpuxMM
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-