General
-
Target
3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945
-
Size
684.8MB
-
Sample
241221-tzwdlasqgv
-
MD5
cffbeaff6728b94b1157790a0da8c0e0
-
SHA1
f739e01d798ee1f1c8802daf661fe22a2dc6cb85
-
SHA256
3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945
-
SHA512
afdcc11c9fff4cca1d14d326d4728b3032617b62c2b9ad788b2e78383831cc0240ce0bf428b43e17ef0cb222ccacc99f58ab8b1e9c77804bcaf9bc0033375b76
-
SSDEEP
98304:G9J/BDT4RZr3mc9UUxFKzxx+SjEnodrlW3hvIroVj0Rdfay6cysWtrW4L:e/9Y3n9UiFe+SWodrlW3HVURp7Wtas
Behavioral task
behavioral1
Sample
3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
systembc
178.20.44.196:4127
192.168.1.149:4127
Targets
-
-
Target
3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945
-
Size
684.8MB
-
MD5
cffbeaff6728b94b1157790a0da8c0e0
-
SHA1
f739e01d798ee1f1c8802daf661fe22a2dc6cb85
-
SHA256
3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945
-
SHA512
afdcc11c9fff4cca1d14d326d4728b3032617b62c2b9ad788b2e78383831cc0240ce0bf428b43e17ef0cb222ccacc99f58ab8b1e9c77804bcaf9bc0033375b76
-
SSDEEP
98304:G9J/BDT4RZr3mc9UUxFKzxx+SjEnodrlW3hvIroVj0Rdfay6cysWtrW4L:e/9Y3n9UiFe+SWodrlW3HVURp7Wtas
Score10/10-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-