General
-
Target
d5e688a4e783367094581e1e3acae4c83a020c718f61fa63d95f9fb7ae25f11a
-
Size
4.0MB
-
Sample
250328-xw68gazxaw
-
MD5
f4bb1e65bb5f3b4669290a31238c08db
-
SHA1
6811d8a3a16816906336d3183b014348b6de101f
-
SHA256
d5e688a4e783367094581e1e3acae4c83a020c718f61fa63d95f9fb7ae25f11a
-
SHA512
518d57149d63b2d994bbcaecb8ba86cd3999e93cb69edf4007f155cb2ed320d9c7666ffb6e34ffa8e651671cfb16ce9232334be39dc7634e36a546c1219bd14b
-
SSDEEP
98304:k9DL0zXEpooST7ORzrnSMn+7+tQYsYXxP0lbtj:gwEJ67ORfS7+tKYR0
Static task
static1
Behavioral task
behavioral1
Sample
d5e688a4e783367094581e1e3acae4c83a020c718f61fa63d95f9fb7ae25f11a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5e688a4e783367094581e1e3acae4c83a020c718f61fa63d95f9fb7ae25f11a.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
d5e688a4e783367094581e1e3acae4c83a020c718f61fa63d95f9fb7ae25f11a
-
Size
4.0MB
-
MD5
f4bb1e65bb5f3b4669290a31238c08db
-
SHA1
6811d8a3a16816906336d3183b014348b6de101f
-
SHA256
d5e688a4e783367094581e1e3acae4c83a020c718f61fa63d95f9fb7ae25f11a
-
SHA512
518d57149d63b2d994bbcaecb8ba86cd3999e93cb69edf4007f155cb2ed320d9c7666ffb6e34ffa8e651671cfb16ce9232334be39dc7634e36a546c1219bd14b
-
SSDEEP
98304:k9DL0zXEpooST7ORzrnSMn+7+tQYsYXxP0lbtj:gwEJ67ORfS7+tKYR0
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-