General
-
Target
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367
-
Size
1.8MB
-
Sample
220524-cqsgxafeak
-
MD5
820f5bd213f5ff673013f29e6bdc114e
-
SHA1
62adcd3c613a978648daa640febf4d403fbeffb4
-
SHA256
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367
-
SHA512
98825fe6143b108928f3d849533c768495efd120d0cfb70292c9e6e3a553edca74fdb091948c30185a721d72fb994a6d092f0966d5cc18bbdc2d7aaf84754e1d
Static task
static1
Behavioral task
behavioral1
Sample
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Targets
-
-
Target
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367
-
Size
1.8MB
-
MD5
820f5bd213f5ff673013f29e6bdc114e
-
SHA1
62adcd3c613a978648daa640febf4d403fbeffb4
-
SHA256
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367
-
SHA512
98825fe6143b108928f3d849533c768495efd120d0cfb70292c9e6e3a553edca74fdb091948c30185a721d72fb994a6d092f0966d5cc18bbdc2d7aaf84754e1d
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-