General
-
Target
Invoice_10-05_order_243_PDF.iso
-
Size
5.1MB
-
Sample
221008-v99veafbb9
-
MD5
7ac101af437a95d3c807b700cea04b5c
-
SHA1
fd13343f8385faf32457f68759f53d64933e08f3
-
SHA256
a035499bec49b0cc817c1b28c54c3e54bf32da37ead102ddcecc774b78f787cc
-
SHA512
c4ccfb59ce8e7e4ddc7e220e54775ea6132f1f471c7caefecae58bac4113ca77918aa4a65d782503c7f1c76a619a9bec5394a999f0bb6fd69b3feb6a36c12c01
-
SSDEEP
49152:2i85Zvppa5zh0ldtkedFfzgoOxP0Jh44m:Fao9h6diYhaxP0Jh44m
Static task
static1
Malware Config
Extracted
bumblebee
0510
51.83.250.102:443
150.125.181.52:443
208.115.216.246:443
192.119.77.44:443
Targets
-
-
Target
Invoice_10-05_order_243_PDF.iso
-
Size
5.1MB
-
MD5
7ac101af437a95d3c807b700cea04b5c
-
SHA1
fd13343f8385faf32457f68759f53d64933e08f3
-
SHA256
a035499bec49b0cc817c1b28c54c3e54bf32da37ead102ddcecc774b78f787cc
-
SHA512
c4ccfb59ce8e7e4ddc7e220e54775ea6132f1f471c7caefecae58bac4113ca77918aa4a65d782503c7f1c76a619a9bec5394a999f0bb6fd69b3feb6a36c12c01
-
SSDEEP
49152:2i85Zvppa5zh0ldtkedFfzgoOxP0Jh44m:Fao9h6diYhaxP0Jh44m
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-