General
-
Target
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b
-
Size
2.0MB
-
Sample
220625-l6kaxagaaq
-
MD5
3eca81e66df552071c3496eab4de2eae
-
SHA1
4e11906bfc2ce971bfd1221f8552f960c632a811
-
SHA256
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b
-
SHA512
bd695b323e2c581610e41c16c671f5e1ca4b9913075846233ffc6b81611b6f0afa2a953f5ae1b98733af597286568da823311c78717898f21586dacb9705b7d4
Static task
static1
Behavioral task
behavioral1
Sample
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Targets
-
-
Target
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b
-
Size
2.0MB
-
MD5
3eca81e66df552071c3496eab4de2eae
-
SHA1
4e11906bfc2ce971bfd1221f8552f960c632a811
-
SHA256
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b
-
SHA512
bd695b323e2c581610e41c16c671f5e1ca4b9913075846233ffc6b81611b6f0afa2a953f5ae1b98733af597286568da823311c78717898f21586dacb9705b7d4
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-