General
-
Target
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1
-
Size
4.2MB
-
Sample
220525-b9vwpsahcq
-
MD5
a97298f5d70fd3eb9c46bc5bb14b6cd6
-
SHA1
7fd6fe0c946ca25386c0402efa6d43f545193b6a
-
SHA256
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1
-
SHA512
2c4ee94382590a7a5427dd7c462767e6d6c5c38f379e181a13b1e300c5869f171722519f37eed095efa80449b738e0892fe01be3c38b695380ac86b8d5b2b10f
Static task
static1
Behavioral task
behavioral1
Sample
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1
-
Size
4.2MB
-
MD5
a97298f5d70fd3eb9c46bc5bb14b6cd6
-
SHA1
7fd6fe0c946ca25386c0402efa6d43f545193b6a
-
SHA256
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1
-
SHA512
2c4ee94382590a7a5427dd7c462767e6d6c5c38f379e181a13b1e300c5869f171722519f37eed095efa80449b738e0892fe01be3c38b695380ac86b8d5b2b10f
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-