General
-
Target
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
-
Size
2.0MB
-
Sample
220724-vw2a4sccf2
-
MD5
e841f039dd3583e617ffe376df63b87c
-
SHA1
d8d998f26b3b73a0631824d1336a25f6f14b7e84
-
SHA256
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
-
SHA512
7b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
Static task
static1
Behavioral task
behavioral1
Sample
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Targets
-
-
Target
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
-
Size
2.0MB
-
MD5
e841f039dd3583e617ffe376df63b87c
-
SHA1
d8d998f26b3b73a0631824d1336a25f6f14b7e84
-
SHA256
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
-
SHA512
7b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
Score10/10-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-