General
-
Target
Loader.exe
-
Size
7.8MB
-
Sample
240630-pjjbwaxfpb
-
MD5
7a960cd7fcf3c530389ed176c5f4bc67
-
SHA1
60e8a9b976097da9e3c6b6bd6a2710cf0092cf39
-
SHA256
7523198ff0e6c82a4e8cdd35e0f2773e9972e23b4507ca408821b5a8775fc93a
-
SHA512
98c628a5c47f5ca1b06a3bb0bc9b0bef1d4afe3f7d3d4e589abb56f04577de45559f4a60555388e93037eecf5d66717fdc40a3095b3eaff05fe8c01f8a87ad1a
-
SSDEEP
196608:75uIxb2qFQOQNzHNh/xYmolV6ehwsDC5kkkecj:75uCKqF9QNzHNUXVLhnCek3cj
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
7.8MB
-
MD5
7a960cd7fcf3c530389ed176c5f4bc67
-
SHA1
60e8a9b976097da9e3c6b6bd6a2710cf0092cf39
-
SHA256
7523198ff0e6c82a4e8cdd35e0f2773e9972e23b4507ca408821b5a8775fc93a
-
SHA512
98c628a5c47f5ca1b06a3bb0bc9b0bef1d4afe3f7d3d4e589abb56f04577de45559f4a60555388e93037eecf5d66717fdc40a3095b3eaff05fe8c01f8a87ad1a
-
SSDEEP
196608:75uIxb2qFQOQNzHNh/xYmolV6ehwsDC5kkkecj:75uCKqF9QNzHNUXVLhnCek3cj
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-