General
-
Target
Invoice_unpaid#4103.iso
-
Size
2.8MB
-
Sample
221009-q8rj8ahbhr
-
MD5
6bb0a020774dcc2f7420ad78148edb97
-
SHA1
9d44941088da4c1c88900f012a07ec7b5ed3ef55
-
SHA256
3447ba5b8c816bf1f1429b2f130603efcb7b5d4b3bc004f4694dc2fb68ec9780
-
SHA512
0c1dabe119488ceec631d58a6f76c80ec9add19c51fd0d00538ffe4231395eaf363501959ac998e22e23a6934b12a820ea22aa69e5869c657b23109e669d1c89
-
SSDEEP
49152:CCP/6PLKTZLk+qM/6ZakaGs810EntI9mHchyN1fPan8/v4y9:N20v/wSU1082mHzpPan0
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_unpaid#4103.iso
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
0610
45.147.231.156:443
208.115.216.246:443
23.29.115.164:443
45.61.186.18:443
51.83.250.102:443
192.119.77.44:443
Targets
-
-
Target
Invoice_unpaid#4103.iso
-
Size
2.8MB
-
MD5
6bb0a020774dcc2f7420ad78148edb97
-
SHA1
9d44941088da4c1c88900f012a07ec7b5ed3ef55
-
SHA256
3447ba5b8c816bf1f1429b2f130603efcb7b5d4b3bc004f4694dc2fb68ec9780
-
SHA512
0c1dabe119488ceec631d58a6f76c80ec9add19c51fd0d00538ffe4231395eaf363501959ac998e22e23a6934b12a820ea22aa69e5869c657b23109e669d1c89
-
SSDEEP
49152:CCP/6PLKTZLk+qM/6ZakaGs810EntI9mHchyN1fPan8/v4y9:N20v/wSU1082mHzpPan0
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-