General
-
Target
document_96.zip
-
Size
901KB
-
Sample
220627-xwnfcschdl
-
MD5
ab08a3ac884b536d066c21a23e4398fc
-
SHA1
693d2aa814170ab445a7ac6f8484b77331c5a574
-
SHA256
db659ed35506bd3963f5d631dea78ed965d2f7ba0f8a824412618e37712d66fa
-
SHA512
ee43182fa2ffbcef873281936d0644547c49a53a0e8f23a18b7310195377d5988c6788ee64bb0814a34d019d40a82d6702fd4a1dabf29ec21671a25976219bfd
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
n3zarek.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
n3zarek.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
276r
76.81.225.65:337
41.28.188.77:212
51.199.209.83:290
192.119.77.100:443
68.121.248.35:464
54.37.131.14:443
149.197.87.217:409
224.110.0.53:105
253.13.70.127:340
122.50.173.112:157
103.25.51.23:388
199.61.79.119:346
68.14.88.177:143
227.12.148.222:270
33.93.97.183:112
168.113.169.88:428
64.157.160.42:207
156.151.142.100:123
146.19.253.56:443
135.36.57.27:157
124.79.186.17:245
254.230.180.37:486
179.4.178.202:339
14.155.143.74:191
31.228.253.114:427
218.122.217.28:234
212.107.138.109:287
29.122.243.158:226
175.90.216.232:197
12.75.186.131:263
227.233.79.54:327
156.165.161.82:298
150.37.37.18:112
145.250.252.150:418
234.248.206.141:176
141.69.161.34:281
24.4.68.32:418
10.28.17.62:401
194.120.202.95:468
245.245.176.160:137
78.24.136.181:493
28.107.38.196:269
151.233.218.244:192
21.21.141.32:133
159.117.143.69:265
154.171.215.86:169
78.74.20.180:433
135.79.221.116:303
194.129.76.203:490
19.32.56.182:487
241.0.19.171:313
35.120.155.220:262
155.180.101.133:318
Targets
-
-
Target
documents.lnk
-
Size
2KB
-
MD5
663851b4f1b3ad5acd85c4ab15493e71
-
SHA1
32060a7f992322ac9bdf6d976d60181111b571d6
-
SHA256
68e3bf7eec93dfd4394746769532dbc890207fd6f554c18165e8a2746b3fe2d2
-
SHA512
0d51286f76f3f8fd292574b97803891571e3c20a110e7b830208591f69fab86941708e1751d3851724b0a12f610ba603afb259451c9e480e42fc306d0688e828
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
n3zarek.dll
-
Size
1.4MB
-
MD5
98a63f31289d5b8106140da1d3fc2f60
-
SHA1
f479133350af108ed30e633067467df6f17a4fda
-
SHA256
c536f15022bc8cc16dede9cbd855008ed6c80908245e129425662948014d90c1
-
SHA512
bfe86795b6838cfe4c596d5dda9c7429a85ed61b43580d5b0137c3cdb508b8a1da386da8487907fdd003cda259029b98bdd97563ce2e4a4075fb333eb63ae2ad
Score3/10 -