General
-
Target
2eb0bae173c8d79bc9180db259f08700ace9992e23c8560c89d28e0080c4bcba
-
Size
1.3MB
-
Sample
220622-h6368sachm
-
MD5
2c5b777d32eb0ab76804e42db1318dbd
-
SHA1
f753f0e94ca4eaf10560285b67f44b23ae909dee
-
SHA256
2eb0bae173c8d79bc9180db259f08700ace9992e23c8560c89d28e0080c4bcba
-
SHA512
ce21df1d4b5ea30ed9a66a3b25d87589c8642650f3bef116d563251a848964a2e5ebe249525311ed609ac285f29d51321eec9572b025d9fbf4e8e2fdb6631ff6
Static task
static1
Behavioral task
behavioral1
Sample
2eb0bae173c8d79bc9180db259f08700ace9992e23c8560c89d28e0080c4bcba.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2eb0bae173c8d79bc9180db259f08700ace9992e23c8560c89d28e0080c4bcba.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
2eb0bae173c8d79bc9180db259f08700ace9992e23c8560c89d28e0080c4bcba
-
Size
1.3MB
-
MD5
2c5b777d32eb0ab76804e42db1318dbd
-
SHA1
f753f0e94ca4eaf10560285b67f44b23ae909dee
-
SHA256
2eb0bae173c8d79bc9180db259f08700ace9992e23c8560c89d28e0080c4bcba
-
SHA512
ce21df1d4b5ea30ed9a66a3b25d87589c8642650f3bef116d563251a848964a2e5ebe249525311ed609ac285f29d51321eec9572b025d9fbf4e8e2fdb6631ff6
Score10/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
LoaderBot executable
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-