General
-
Target
Vape V4.08.bin
-
Size
12.3MB
-
Sample
220710-qc7xbsbegj
-
MD5
8a6e94a3f25c16c3589b5d285241aea0
-
SHA1
621e46fa5c5f6c16a4335e4d9cc246b74b92b22a
-
SHA256
e03193692369abba7bce150aa3d954d6d72653b6eaa64da050ef0b9bbd3cf8b1
-
SHA512
eb9e8a7857c060d4283c93a2144d579d183859a6a40b1c0218c7b883571f0d38852710a7e2ad4f6da125ebd7036c594ba72a47f171c243fc74933d331b701571
Static task
static1
Behavioral task
behavioral1
Sample
Vape V4.08.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
Vape V4.08.bin
-
Size
12.3MB
-
MD5
8a6e94a3f25c16c3589b5d285241aea0
-
SHA1
621e46fa5c5f6c16a4335e4d9cc246b74b92b22a
-
SHA256
e03193692369abba7bce150aa3d954d6d72653b6eaa64da050ef0b9bbd3cf8b1
-
SHA512
eb9e8a7857c060d4283c93a2144d579d183859a6a40b1c0218c7b883571f0d38852710a7e2ad4f6da125ebd7036c594ba72a47f171c243fc74933d331b701571
-
Detect Blackmoon payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-