General
-
Target
invo.zip
-
Size
898KB
-
Sample
220627-1la9tsddep
-
MD5
3a8ff231f043c2fa1cd1ffa9d4bdb401
-
SHA1
cdd2079e963c1a850b051ec877a974ab8c4ffda1
-
SHA256
7010ea36735e5a720f5f7c30ab1cf560e4d47e4fc4a983ed2f6f3d9770fd7737
-
SHA512
67df14ffdea0edb153fd02547f00444e9474d16c6bb22e13b2653d065dd8a18d924b5063dc82226150683e93212987c72072e966700b9dea673643816462eff3
Static task
static1
Behavioral task
behavioral1
Sample
invo/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
invo/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
invo/n3zarek.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
invo/n3zarek.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
276r
76.81.225.65:337
41.28.188.77:212
51.199.209.83:290
192.119.77.100:443
68.121.248.35:464
54.37.131.14:443
149.197.87.217:409
224.110.0.53:105
253.13.70.127:340
122.50.173.112:157
103.25.51.23:388
199.61.79.119:346
68.14.88.177:143
227.12.148.222:270
33.93.97.183:112
168.113.169.88:428
64.157.160.42:207
156.151.142.100:123
146.19.253.56:443
135.36.57.27:157
124.79.186.17:245
254.230.180.37:486
179.4.178.202:339
14.155.143.74:191
31.228.253.114:427
218.122.217.28:234
212.107.138.109:287
29.122.243.158:226
175.90.216.232:197
12.75.186.131:263
227.233.79.54:327
156.165.161.82:298
150.37.37.18:112
145.250.252.150:418
234.248.206.141:176
141.69.161.34:281
24.4.68.32:418
10.28.17.62:401
194.120.202.95:468
245.245.176.160:137
78.24.136.181:493
28.107.38.196:269
151.233.218.244:192
21.21.141.32:133
159.117.143.69:265
154.171.215.86:169
78.74.20.180:433
135.79.221.116:303
194.129.76.203:490
19.32.56.182:487
241.0.19.171:313
35.120.155.220:262
155.180.101.133:318
Targets
-
-
Target
invo/documents.lnk
-
Size
2KB
-
MD5
663851b4f1b3ad5acd85c4ab15493e71
-
SHA1
32060a7f992322ac9bdf6d976d60181111b571d6
-
SHA256
68e3bf7eec93dfd4394746769532dbc890207fd6f554c18165e8a2746b3fe2d2
-
SHA512
0d51286f76f3f8fd292574b97803891571e3c20a110e7b830208591f69fab86941708e1751d3851724b0a12f610ba603afb259451c9e480e42fc306d0688e828
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
invo/n3zarek.dll
-
Size
1.4MB
-
MD5
3bd955af74d15e226fd00c7c8556858d
-
SHA1
8bd4d50e485813c5578b59d5e12658e739a9b818
-
SHA256
c8902ab26a64078ebab618afe410edc41c3d9c6b429a7d84207f112d740cfc51
-
SHA512
8c47d5360324fba49da30384ee05a34ae1abea772c34ec8fa3d5db2793b39d6aa25e59f1551a72a9cafd931d401ab143f618accdd460bd707d9c09f81f52f758
Score3/10 -