General
-
Target
loader1.exe
-
Size
19.6MB
-
Sample
241201-qxclxssndy
-
MD5
fcfb2668c205cf6b25b256420ace004e
-
SHA1
b3b696adff3cc0fc12f027347b582aa9cd7d5f20
-
SHA256
4e3931657ed3103acf45c9356d5ef5648298cbfc5d11f8dd407b94e776c14fd5
-
SHA512
9c577770ca4de729fb55420936802a21f02a765404e7faffc17aaa25bfee45bdfe8e606e0255530f3d01276c3729d285df748790449531eca5e6a393f1440297
-
SSDEEP
393216:vNVL8SLSsbPpiZ8XtX64nYjRG3CA8d6i67sYppz6cvt2dL:1VLxTp2etX2Y3id45pz8L
Behavioral task
behavioral1
Sample
loader1.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
loader1.exe
-
Size
19.6MB
-
MD5
fcfb2668c205cf6b25b256420ace004e
-
SHA1
b3b696adff3cc0fc12f027347b582aa9cd7d5f20
-
SHA256
4e3931657ed3103acf45c9356d5ef5648298cbfc5d11f8dd407b94e776c14fd5
-
SHA512
9c577770ca4de729fb55420936802a21f02a765404e7faffc17aaa25bfee45bdfe8e606e0255530f3d01276c3729d285df748790449531eca5e6a393f1440297
-
SSDEEP
393216:vNVL8SLSsbPpiZ8XtX64nYjRG3CA8d6i67sYppz6cvt2dL:1VLxTp2etX2Y3id45pz8L
-
Remcos family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-