General
-
Target
projectdetails.zip
-
Size
1.4MB
-
Sample
220913-z5v8nscdfj
-
MD5
105260b7bba2b846c6e89a937937ef1d
-
SHA1
8fe18c1608931fc7997fc777002c1553cad66e7f
-
SHA256
3908c6bf8a4e2075c96eab04aea242cae7099c902d4a587f0c5a314c86574b32
-
SHA512
82224a963668ea3d8b4a904113b64c75b2dd5611645d6e0179a6d121b141f3b9698b1a5cf7cb6b9f298f02b85da795ce64243f3899c57391bea5a569ed5bbb08
-
SSDEEP
24576:1am4ivSISOWgCl8ZztO4VW6X0oBdq+Qi+dg/Iu89oDdLh1homZYY3KUYjrKeH:h6ISDghZzokdvq+Qndg/Iu/t1homyY6L
Static task
static1
Behavioral task
behavioral1
Sample
date.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
date.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
nda.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
nda.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
date.bat
-
Size
910B
-
MD5
652df2302ccf03eef2e2afdcd3f6a989
-
SHA1
860cd1625a486903b69b40d997beecff5251072b
-
SHA256
9a03515a444099863795a429e0966bdb04eacce93c968f27a588296992657617
-
SHA512
892ac5a89e0cfef9d98c26f2432f024622172aeaa845c88c472922708d7c33823e846c8955b1db9cbc03dd7ece71f38e3d89367b7def6590c47e7353c7a0bae9
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
nda.dll
-
Size
3.3MB
-
MD5
004a11030bdf210d2f36c5280e4eeaa1
-
SHA1
d156d3f25550b641872e5e3ee6ce8c73929211f2
-
SHA256
22f7098c8701542bde29f6276c4d0a2a1b02fb8e724845b8a8948c7adcf94193
-
SHA512
47daa0e7029a7d33491fe627717e2d5778b2271fbc19ed7adbc7a30f920ff88a49ad51270d5c47cfcbfd669781898fc9bd1cb8de7f1fa4c9bffe5aedcf52d1de
-
SSDEEP
49152:5/eK7iIVhF9PcqvVJE8jp3xUw15c4xh2V0muT4:ReSUw15c4xh2V0muT4
Score1/10 -
-
-
Target
project details.lnk
-
Size
1KB
-
MD5
bb29ceef1d0fe4bb80a72e4f353c181a
-
SHA1
84762568338708fa34ef2f891bf467fbdfcdff44
-
SHA256
ba1a303a44ebe7586740a88d3482cd2d212a46b90df0759eda88bab08ba37a4d
-
SHA512
3cc8b6a4dd7c70ae46d76aeccf51cedfc499a17e199946436d1db92e2e45f6429a8af5b840030a547a72ec797d89b2a7930fef60c111064d52630c11286a5524
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-