General
-
Target
s3negar.zip
-
Size
956KB
-
Sample
220621-ty5wmsfgbm
-
MD5
b780f6d5f99ad6a14cb7133104e22426
-
SHA1
59b4a089c50e75d9a241ff4774875d1bab4917b6
-
SHA256
ed5506c453718a8a50a65b63b0480dd6861db122d0601af632009156cea19b5b
-
SHA512
583c9ab8f36016ff37399615f1309641ffc365a4ec09c4c9e5b5c1a94dc1e9d028a8248fca0a74626c9893f1d83cecb39724e1d2f2cb25a4004c20ada970bcda
Static task
static1
Behavioral task
behavioral1
Sample
s3negar/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
s3negar/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
s3negar/s3negar.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
s3negar/s3negar.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
2006r
149.4.32.76:241
194.104.136.152:443
119.230.89.42:407
45.153.241.234:443
173.45.237.73:444
169.239.191.195:335
173.107.248.213:137
90.108.111.212:276
146.19.173.105:443
216.4.65.112:354
52.6.247.44:324
162.212.72.241:135
114.188.145.216:303
5.109.171.105:392
142.11.216.143:443
87.144.64.172:286
103.250.125.252:491
117.173.171.58:296
157.2.47.226:120
53.50.204.254:356
2.34.4.38:454
183.0.33.34:163
142.189.175.128:205
225.179.210.217:312
108.19.32.96:487
28.190.254.34:452
37.221.67.122:443
85.152.192.219:370
216.32.204.20:184
121.16.187.83:457
199.42.52.200:451
112.143.41.13:382
123.186.42.228:329
129.68.41.164:186
79.234.141.88:261
78.110.135.61:346
12.82.239.17:144
228.124.215.123:325
247.245.143.91:112
104.168.174.159:443
75.29.108.109:312
126.254.234.119:401
15.69.89.142:344
140.105.178.41:403
135.74.167.74:286
10.254.12.95:336
Targets
-
-
Target
s3negar/documents.lnk
-
Size
2KB
-
MD5
1d43bbd7301e12a5047c10f1938a4e41
-
SHA1
5088ef29327d60651678cadc8e00e3cca95c4dfb
-
SHA256
26f55122d1ab31238ceb46e816717c50dd2aad69a991ef79f5a4824bbe96b921
-
SHA512
826257ff28350eb645ed68f8fcf87a02d267b2594ee37963478807aeec391a5840977b80719882681eb29183206bc0d5936e92e31fdc4dfc0154b147edcc0570
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
s3negar/s3negar.dll
-
Size
1.6MB
-
MD5
83f07110df33b070ebe99613a1acda4c
-
SHA1
c97c747f3cb228ba3b00c0359fea2236070cb910
-
SHA256
7173bf751a2bf8fb237a7cde943ddedd4e89a2b15b571899c84fbaa87c233e8f
-
SHA512
0ff98beb21c391a54417b688cc38cdf38374af8ca3b27034a478c307f9f83699cc28babd326965349ee81d722aa341e63dca2157da341f8bceb7b29b69fd6224
Score3/10 -