General
-
Target
Invoice_09-12-22_order_83.iso
-
Size
4.2MB
-
Sample
220929-vhh8dabeb9
-
MD5
0c36704774ee6638904dee295615d300
-
SHA1
cc1e1579b73dd1dac3fa16156e0056d11eaa3e87
-
SHA256
5d5502e6a5a6ee273ffa23e8a400a1aa53d98a86299996194c338403098dcbdb
-
SHA512
1fff99909ad09497cdc6f5c37ad7f3abc307daf0a7000d5b0e1456e2d184aa5b44b774f3ecd42f2fdc9d001566bdbb8c20900f1fc7bf78df925c85f75ff1bb34
-
SSDEEP
49152:af+yMskuLMNWBqp6kzWjaNRVErtAuOm5gE2dkPa:af+EkuLS32tqmyE2Gy
Static task
static1
Malware Config
Extracted
bumblebee
1209
142.11.211.32:443
146.59.116.49:443
192.236.155.219:443
Targets
-
-
Target
Invoice_09-12-22_order_83.iso
-
Size
4.2MB
-
MD5
0c36704774ee6638904dee295615d300
-
SHA1
cc1e1579b73dd1dac3fa16156e0056d11eaa3e87
-
SHA256
5d5502e6a5a6ee273ffa23e8a400a1aa53d98a86299996194c338403098dcbdb
-
SHA512
1fff99909ad09497cdc6f5c37ad7f3abc307daf0a7000d5b0e1456e2d184aa5b44b774f3ecd42f2fdc9d001566bdbb8c20900f1fc7bf78df925c85f75ff1bb34
-
SSDEEP
49152:af+yMskuLMNWBqp6kzWjaNRVErtAuOm5gE2dkPa:af+EkuLS32tqmyE2Gy
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-