General
-
Target
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
-
Size
1.7MB
-
Sample
220625-l6hr3sabc7
-
MD5
e24c03961d09e9ee6c218981e054af2a
-
SHA1
fcb86a0766159acffb08a785239a1af16010d9ff
-
SHA256
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
-
SHA512
0d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1
Static task
static1
Behavioral task
behavioral1
Sample
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Targets
-
-
Target
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
-
Size
1.7MB
-
MD5
e24c03961d09e9ee6c218981e054af2a
-
SHA1
fcb86a0766159acffb08a785239a1af16010d9ff
-
SHA256
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
-
SHA512
0d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-