General
-
Target
Precise Temp.exe
-
Size
4.5MB
-
Sample
241123-yx1bzstpds
-
MD5
6509b704aa9ebb7452bc4a77b18a9e9e
-
SHA1
91bb981b702e16913af49a0e59f64da025bb3af8
-
SHA256
86e6fab2b9c9a219365a962076ddb69f947ec1f35e971703b0ed6cb4da528225
-
SHA512
38e6e578f262afe2ecdeedb1bb5103f68c9a61714eb71a494578ff104a2195fca4176e2820c786b7f2907fd6d7ed655684cbf558fed829b445efc6a8b734bfdb
-
SSDEEP
98304:TX+roAWebtAIaAgq9uAmb7YJrr9/xFJ4E1ZI+9dUbEhP1X:yrxZtXadOG+Pzh
Behavioral task
behavioral1
Sample
Precise Temp.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Precise Temp.exe
-
Size
4.5MB
-
MD5
6509b704aa9ebb7452bc4a77b18a9e9e
-
SHA1
91bb981b702e16913af49a0e59f64da025bb3af8
-
SHA256
86e6fab2b9c9a219365a962076ddb69f947ec1f35e971703b0ed6cb4da528225
-
SHA512
38e6e578f262afe2ecdeedb1bb5103f68c9a61714eb71a494578ff104a2195fca4176e2820c786b7f2907fd6d7ed655684cbf558fed829b445efc6a8b734bfdb
-
SSDEEP
98304:TX+roAWebtAIaAgq9uAmb7YJrr9/xFJ4E1ZI+9dUbEhP1X:yrxZtXadOG+Pzh
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-