General
-
Target
documents.zip
-
Size
923KB
-
Sample
220627-1g2k8adddj
-
MD5
f3b48bbfcf2870da35d2944ce6a83db3
-
SHA1
ea1d53f527b44e402d061cf236a5b2a1dc89fd1e
-
SHA256
d2cf5e5e1018f5bc2192ed06dca9732d687cc2735aa07bf763c1721df108a36e
-
SHA512
c6adc570474534cf19968faa6d6f1cd59df6d6a7b78ec87772f7a0625bf23505b12b89db1044f7482b83a4f5fbbb1070b94898162e67ba89583edcadac1ae32d
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
n3zarek.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
n3zarek.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
276r
76.81.225.65:337
41.28.188.77:212
51.199.209.83:290
192.119.77.100:443
68.121.248.35:464
54.37.131.14:443
149.197.87.217:409
224.110.0.53:105
253.13.70.127:340
122.50.173.112:157
103.25.51.23:388
199.61.79.119:346
68.14.88.177:143
227.12.148.222:270
33.93.97.183:112
168.113.169.88:428
64.157.160.42:207
156.151.142.100:123
146.19.253.56:443
135.36.57.27:157
124.79.186.17:245
254.230.180.37:486
179.4.178.202:339
14.155.143.74:191
31.228.253.114:427
218.122.217.28:234
212.107.138.109:287
29.122.243.158:226
175.90.216.232:197
12.75.186.131:263
227.233.79.54:327
156.165.161.82:298
150.37.37.18:112
145.250.252.150:418
234.248.206.141:176
141.69.161.34:281
24.4.68.32:418
10.28.17.62:401
194.120.202.95:468
245.245.176.160:137
78.24.136.181:493
28.107.38.196:269
151.233.218.244:192
21.21.141.32:133
159.117.143.69:265
154.171.215.86:169
78.74.20.180:433
135.79.221.116:303
194.129.76.203:490
19.32.56.182:487
241.0.19.171:313
35.120.155.220:262
155.180.101.133:318
Targets
-
-
Target
documents.lnk
-
Size
2KB
-
MD5
663851b4f1b3ad5acd85c4ab15493e71
-
SHA1
32060a7f992322ac9bdf6d976d60181111b571d6
-
SHA256
68e3bf7eec93dfd4394746769532dbc890207fd6f554c18165e8a2746b3fe2d2
-
SHA512
0d51286f76f3f8fd292574b97803891571e3c20a110e7b830208591f69fab86941708e1751d3851724b0a12f610ba603afb259451c9e480e42fc306d0688e828
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
n3zarek.dll
-
Size
1.4MB
-
MD5
8135745a29f02e96db7b075de3bb7fdb
-
SHA1
fabafe2e3440dbd71d8d9614a3c8abfb1434eac9
-
SHA256
90576eb6754dd1c38fb4cea4bf3f029535900436a02caee891c057c01ca84941
-
SHA512
df5b9c699f5f85d3d666b4cb0d05f49f798a8c3fec93e98fdc0ccc703bc1cabc5752852e1a5f4020fdd9c7a1c48337ff4370b18091e03b6155262e77daafe43d
Score3/10 -