General
-
Target
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f
-
Size
1.9MB
-
Sample
220524-16s1dahha4
-
MD5
fbaf48e37d532389bc0dbb3bc48c629f
-
SHA1
7b5d1a86826b4f947c14369acce0d27198119bec
-
SHA256
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f
-
SHA512
945623b3aa28676b93b7b9d49c4dc548b6b5e76838268563abd8ba6d75027567663cb78647698ef908f89ab22de5718f94727cefddfd0a41f38bc5ca60ea61d0
Static task
static1
Behavioral task
behavioral1
Sample
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Targets
-
-
Target
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f
-
Size
1.9MB
-
MD5
fbaf48e37d532389bc0dbb3bc48c629f
-
SHA1
7b5d1a86826b4f947c14369acce0d27198119bec
-
SHA256
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f
-
SHA512
945623b3aa28676b93b7b9d49c4dc548b6b5e76838268563abd8ba6d75027567663cb78647698ef908f89ab22de5718f94727cefddfd0a41f38bc5ca60ea61d0
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-