General
-
Target
TFT_SERVER.exe
-
Size
13.9MB
-
Sample
250327-ygb98axtav
-
MD5
367eed9cd88ac6c7b85d81640b028e74
-
SHA1
4cb2fcc17d94065c44b8989c3cb83887059d552b
-
SHA256
b28f01c902ee902205c5fd1486983991d54f5ee90024a82e4c516eede2c46ae7
-
SHA512
cbc75068c05cbcddd9920e11aa017b0bd60cd171dd89bfa3cce4c27fdc3913e8ed9863d56b8040e2b2fcfc9e6d71ad84c2659f2a0ecc3ef21dfec5a211c582fe
-
SSDEEP
196608:t6ST+pvtSR8WKZp3EhpLpTslFV9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDubbjY:r8p3E3pslFVkYVI5DK2NNs6LtYdEhSp
Behavioral task
behavioral1
Sample
TFT_SERVER.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Targets
-
-
Target
TFT_SERVER.exe
-
Size
13.9MB
-
MD5
367eed9cd88ac6c7b85d81640b028e74
-
SHA1
4cb2fcc17d94065c44b8989c3cb83887059d552b
-
SHA256
b28f01c902ee902205c5fd1486983991d54f5ee90024a82e4c516eede2c46ae7
-
SHA512
cbc75068c05cbcddd9920e11aa017b0bd60cd171dd89bfa3cce4c27fdc3913e8ed9863d56b8040e2b2fcfc9e6d71ad84c2659f2a0ecc3ef21dfec5a211c582fe
-
SSDEEP
196608:t6ST+pvtSR8WKZp3EhpLpTslFV9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDubbjY:r8p3E3pslFVkYVI5DK2NNs6LtYdEhSp
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Checks whether UAC is enabled
-