General
-
Target
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa
-
Size
1.4MB
-
Sample
220725-d5z1zadaf4
-
MD5
652ab99bb0d38c2b096919ad9827cca6
-
SHA1
9604c9fb9c777f70c4911f575180da9db090ca0e
-
SHA256
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa
-
SHA512
b8f7ab53ce6360665158d4a8944483bfdcf2c7baf7e03bbd5cc53944e8b3cafdf8eacf105e5851f1cf3a200fadfe52ee24230d08ffacbd9ac74be0e76d005c9d
Static task
static1
Behavioral task
behavioral1
Sample
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe
Resource
win7-20220718-en
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Targets
-
-
Target
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa
-
Size
1.4MB
-
MD5
652ab99bb0d38c2b096919ad9827cca6
-
SHA1
9604c9fb9c777f70c4911f575180da9db090ca0e
-
SHA256
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa
-
SHA512
b8f7ab53ce6360665158d4a8944483bfdcf2c7baf7e03bbd5cc53944e8b3cafdf8eacf105e5851f1cf3a200fadfe52ee24230d08ffacbd9ac74be0e76d005c9d
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-