General
-
Target
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
-
Size
1.7MB
-
Sample
220701-dk9pnshdgj
-
MD5
ef942beae72f6d7b660b572327c83e63
-
SHA1
8a3dbc49f067767eba14991d34eba775bae7c74c
-
SHA256
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
-
SHA512
97714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
Static task
static1
Behavioral task
behavioral1
Sample
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
cook5**gj____+,)diaj*
cook5**gj____+-)diaj*
Targets
-
-
Target
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
-
Size
1.7MB
-
MD5
ef942beae72f6d7b660b572327c83e63
-
SHA1
8a3dbc49f067767eba14991d34eba775bae7c74c
-
SHA256
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
-
SHA512
97714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-