General
-
Target
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
-
Size
1.6MB
-
Sample
220625-jppg7abhfk
-
MD5
7a4a353f71dca138e5cfb11022a8341a
-
SHA1
3b30f19261c8b2b8ba9873486801811dd0afa47e
-
SHA256
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
-
SHA512
1f2bbb338fd39474664a82e51cc34a86c815da3262e25f3177c6b631b1cc7de796ea34bbaa6ee5eea1f667b9955c5ee66fc4062b20b5806dc9e43fecb7d74d1a
Static task
static1
Behavioral task
behavioral1
Sample
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
http://burload01.top/
http://burload02.top/
Targets
-
-
Target
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
-
Size
1.6MB
-
MD5
7a4a353f71dca138e5cfb11022a8341a
-
SHA1
3b30f19261c8b2b8ba9873486801811dd0afa47e
-
SHA256
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
-
SHA512
1f2bbb338fd39474664a82e51cc34a86c815da3262e25f3177c6b631b1cc7de796ea34bbaa6ee5eea1f667b9955c5ee66fc4062b20b5806dc9e43fecb7d74d1a
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-