General
-
Target
51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57
-
Size
3.7MB
-
Sample
241123-2f53pazmhy
-
MD5
3b53beda7cd09fdc8588a7f0633001cf
-
SHA1
ea234ddc0b0bccc03bee0e945063ff4387e23f98
-
SHA256
51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57
-
SHA512
2baa4509102ef94f2612200eb8bf9ca89d014b2e35fef379be39fec745278a1e0441e020df834dbe1f60800cc219d59ca31705e1c7c068d4c9f6194e2047aabc
-
SSDEEP
98304:m+szMRjF1eZVGgF8hRiEsU888SLA781uZ03HJRkh:7s2eZQUyAEv888aAyJwh
Static task
static1
Behavioral task
behavioral1
Sample
51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57
-
Size
3.7MB
-
MD5
3b53beda7cd09fdc8588a7f0633001cf
-
SHA1
ea234ddc0b0bccc03bee0e945063ff4387e23f98
-
SHA256
51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57
-
SHA512
2baa4509102ef94f2612200eb8bf9ca89d014b2e35fef379be39fec745278a1e0441e020df834dbe1f60800cc219d59ca31705e1c7c068d4c9f6194e2047aabc
-
SSDEEP
98304:m+szMRjF1eZVGgF8hRiEsU888SLA781uZ03HJRkh:7s2eZQUyAEv888aAyJwh
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-