General
-
Target
AV-Free Spoofer (1).rar
-
Size
8.5MB
-
Sample
241203-txhdysymgl
-
MD5
e9db8de6465917b32c7c911df0bdf762
-
SHA1
807600ec249fa23dff95cef3a51025af06a98463
-
SHA256
58dfb382f8cd93e1a396182d569afdb54d2cffda09c3ad2b96b11fb14010384c
-
SHA512
4eab01c4bad11c3cd7dae37d5191690a0aec7f97776d03575957dc4e6776e5da5242f3a02b66bd44d179b02504d17f33f621b6581706876878e81ce03ca93c1b
-
SSDEEP
196608:7Mw14vzVwzvsL+zQ/cZve6lMfbbRslssV/YU:ArqzvsL+zQ0ZvmFOlYU
Static task
static1
Behavioral task
behavioral1
Sample
AV-Free Spoofer (1).rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AV-Free Spoofer (1).rar
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
AV-Free Spoofer (1).rar
-
Size
8.5MB
-
MD5
e9db8de6465917b32c7c911df0bdf762
-
SHA1
807600ec249fa23dff95cef3a51025af06a98463
-
SHA256
58dfb382f8cd93e1a396182d569afdb54d2cffda09c3ad2b96b11fb14010384c
-
SHA512
4eab01c4bad11c3cd7dae37d5191690a0aec7f97776d03575957dc4e6776e5da5242f3a02b66bd44d179b02504d17f33f621b6581706876878e81ce03ca93c1b
-
SSDEEP
196608:7Mw14vzVwzvsL+zQ/cZve6lMfbbRslssV/YU:ArqzvsL+zQ0ZvmFOlYU
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1