General
-
Target
Veax Free.rar
-
Size
3.8MB
-
Sample
240630-slzy7azcpc
-
MD5
5c060ff89254355b12b5b097b4114c12
-
SHA1
4e155b40358435464fb041dd37fb5bcfaf630387
-
SHA256
838ca1cdcb23140679f6bf04273976d9e736a7cb0ef23adccba727f741585fe7
-
SHA512
dcdd23d8693456e5391633705afe431309cec0e643d20fcf0cfac18180532a4185857fcdf3e0ff4bbe47f8952700d34de5eaa53261d5a90c1ae8ba39a9e84c23
-
SSDEEP
98304:NKhQYVcpyAozHkpDl3/r9kCGq5eNh8UgxvPFWPADa7sf3/76VNPfU31lr:NWQm87R3ZFGtkgCV/SHUrr
Behavioral task
behavioral1
Sample
Veax Free/serial.bat
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
Veax Free/serial.bat
-
Size
496B
-
MD5
7a5d295e468a75dd7272c7642b1a269f
-
SHA1
efaf4e7994cb38ea78aceed95b00cac1918984d0
-
SHA256
230e6a26c9feabb1d82f27845290942db22fbe2877faf05c093bc139edeeb7f0
-
SHA512
f23b628243601e1c3a9014dd3c735188be6b669be1772d39acbdb9f63486ceb2b374989f7e39bf8d04391d6f977d0e064ac79b263a0ff4e76a775e323f052b64
Score1/10 -
-
-
Target
Veax Free/veax_protected.exe
-
Size
3.8MB
-
MD5
386428b81e1a52e63f688e9ed323d066
-
SHA1
bd94ce6bd113d2f1b69af81244b268fda9d99160
-
SHA256
91bd58996da4433a6ce296547bea69861478b653117315831bfd825b2e4e0d3a
-
SHA512
d5b0d98a981f7ee2571ed2b4ed3932c71c0629676e9bbb7e3e457a347f029f1abe43b951c7e9430f0afc9f06bc886f28b198a828a837a2fd98fe5758ae35f15a
-
SSDEEP
49152:tI7WUD3/Bu/mJiKNUyGy8lPO3dpFwvq8zZ9TMit9nXIALJ95Z+0dVgBreCdz3xo2:tuvJiAGytb8Xpt9ICJ95BdVgJ1CH7Glj
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-