General
-
Target
67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a.exe
-
Size
2.8MB
-
Sample
241123-va138axrd1
-
MD5
c700c8b1afa60ef0076fea819805a382
-
SHA1
4006e4e686fbe9e57401925e252b981e5303506c
-
SHA256
67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a
-
SHA512
67293cc96f0fe03c211bc8dd009023fb0bf079b53888eace944d576fe523894e9ea80dddeac2b6cec1a098e001fce6bdf81d247af4d16476353bb51656c7b670
-
SSDEEP
49152:uZmp6X09Ht+USUU5nw9hcG9qY0EQSvFxgkRD+N1Yq21u8iVh//xsIyBdX3WSH:j6XUt+UvwWhIYmkxgAuS1ib3CbG6
Behavioral task
behavioral1
Sample
67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a.exe
-
Size
2.8MB
-
MD5
c700c8b1afa60ef0076fea819805a382
-
SHA1
4006e4e686fbe9e57401925e252b981e5303506c
-
SHA256
67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a
-
SHA512
67293cc96f0fe03c211bc8dd009023fb0bf079b53888eace944d576fe523894e9ea80dddeac2b6cec1a098e001fce6bdf81d247af4d16476353bb51656c7b670
-
SSDEEP
49152:uZmp6X09Ht+USUU5nw9hcG9qY0EQSvFxgkRD+N1Yq21u8iVh//xsIyBdX3WSH:j6XUt+UvwWhIYmkxgAuS1ib3CbG6
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-