General
-
Target
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
-
Size
1.8MB
-
Sample
220708-y3z86sfddj
-
MD5
12879fe44a82eb3491d7e04ed821a740
-
SHA1
8984616aade39197467c89cb08b1b42345acbed4
-
SHA256
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
-
SHA512
8110746c6db6169a836d5f8c2f231a6b862cf878b9c1af5625770cb050fa86b2efa64614313783deb3d26f6533f90ed284a158b9f97f139cd920c715a07cb6b6
Static task
static1
Behavioral task
behavioral1
Sample
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Targets
-
-
Target
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
-
Size
1.8MB
-
MD5
12879fe44a82eb3491d7e04ed821a740
-
SHA1
8984616aade39197467c89cb08b1b42345acbed4
-
SHA256
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
-
SHA512
8110746c6db6169a836d5f8c2f231a6b862cf878b9c1af5625770cb050fa86b2efa64614313783deb3d26f6533f90ed284a158b9f97f139cd920c715a07cb6b6
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-