General
-
Target
20220615_smashSample.zip
-
Size
995KB
-
Sample
220615-xdsx5adha5
-
MD5
e2ebbe38a701adaf413852f1fd6b5ce3
-
SHA1
479d544b4769ad1def8a65c52144ddffbe1a3954
-
SHA256
d933c1312d76c6d5759adbe705be02a6496f9d1f7af83629d2203a0b63bbac1f
-
SHA512
8db1417c0cf910109df64d555ce3b6136699d4c13bbf7ae073b136e8814fb1a4912a3c1c86e1a81036b2f5f09ac67df14d6e2c5906db7fb94b64309dd099f599
Static task
static1
Behavioral task
behavioral1
Sample
project requirements.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
project requirements.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
project.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
project.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
project.rsp
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
project.rsp
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
156a
83.47.40.251:306
251.143.69.150:395
64.250.120.4:406
115.16.153.155:459
233.82.38.10:391
60.27.170.3:463
221.218.33.190:154
218.199.149.25:415
0.134.23.62:116
241.41.90.117:181
78.244.227.62:462
146.70.125.122:443
224.49.28.61:214
2.97.24.126:148
112.81.173.199:399
170.107.238.10:276
45.84.0.13:443
210.163.58.211:385
146.19.173.186:443
154.56.0.102:443
168.20.103.16:132
51.210.158.156:443
193.43.251.231:312
135.142.208.39:298
9.240.112.25:411
155.113.182.180:324
174.58.225.25:420
208.151.241.134:362
228.127.34.30:316
178.255.155.53:108
30.65.48.152:239
135.36.13.40:427
117.50.181.41:373
213.26.162.157:477
78.174.92.106:151
114.9.152.233:402
1.32.39.22:459
224.255.62.16:414
45.3.236.177:312
185.62.56.202:443
251.210.76.59:335
120.237.172.163:343
32.181.245.23:191
79.198.114.179:442
242.30.221.68:198
95.29.177.99:462
Targets
-
-
Target
project requirements.lnk
-
Size
1KB
-
MD5
db4e4a4e926e4dfe525929250afe7ae7
-
SHA1
4eb0bb7294c53f896527ce770e3c299c2fcbfdca
-
SHA256
7c38f9a113c85027806676885e027e4ed7de6b3c9bbd0861babfc2a8c911ec48
-
SHA512
f75a3e9b0bb22c9335bbd38bda8858ec6d7f11dd66c0bd26d45be4d9c0c4f49b9f559e5ed4be9da7a9f9e77f920c0aebb27ae60876a26635987ba504b997a538
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
project.dat
-
Size
1.5MB
-
MD5
fb30fa42b6fb4cbbbc3f597cc782e56a
-
SHA1
f0c5391dc040286cac62d5900ddc20c178da0839
-
SHA256
7935ad8c2dc8d082530650b858d1a2f53f4990a376ca84e3c29ce7ae5bec94dc
-
SHA512
03171c8e689042be587b98533dd8c737331ca4357ded0774db6e8a6feda2de2dd8c9f6f66b300080425756bba1bf77fcb361ea8ffbba9b2a2e5f687b224ac60d
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
project.rsp
-
Size
18B
-
MD5
06c6c9e9f69b6ba4bea7dd172904ee74
-
SHA1
4e86f1b41630dbf43be2bc82e516317c166aef8f
-
SHA256
3b41f2bb928cb4ae75944da01bf3204dd7fda3f80ae1b800395656b70b53a4ab
-
SHA512
e5bfffa1cda707667f4ea389775badb69bf4542e243b0489d042d2a3b5c1eeed8ad098f240ddc029a4f7ebe837ca3bcd5532cf2fa0434477d5dc5245d1adb8f9
Score3/10 -