General
-
Target
d3fe1d3ce612802e798146bedb917cbb09ed35cdceb08055982cfeedbcd065de
-
Size
2.1MB
-
Sample
221116-weksgacb95
-
MD5
c1f89c080b7e8b3b5e7a66db29e20fc8
-
SHA1
4896d7514ab13242c337018553ac5e69322fe4e4
-
SHA256
d3fe1d3ce612802e798146bedb917cbb09ed35cdceb08055982cfeedbcd065de
-
SHA512
d1f2902dd1d78b42254307993921565bb3767a9275aa63fa789f528a9afb03a045a9a85b684702ef2f9705ad5e98a56730a5c94d51ba9c2a73deaab5428845ea
-
SSDEEP
49152:HuvsT2BRHNRP24WFj6lDtKnox8Rme1sJPYsFYRR:HkoMRHNQwxtKnrRme1iY+
Static task
static1
Malware Config
Extracted
systembc
slavelever.info:4248
slavelevereoewl.info:4248
Targets
-
-
Target
d3fe1d3ce612802e798146bedb917cbb09ed35cdceb08055982cfeedbcd065de
-
Size
2.1MB
-
MD5
c1f89c080b7e8b3b5e7a66db29e20fc8
-
SHA1
4896d7514ab13242c337018553ac5e69322fe4e4
-
SHA256
d3fe1d3ce612802e798146bedb917cbb09ed35cdceb08055982cfeedbcd065de
-
SHA512
d1f2902dd1d78b42254307993921565bb3767a9275aa63fa789f528a9afb03a045a9a85b684702ef2f9705ad5e98a56730a5c94d51ba9c2a73deaab5428845ea
-
SSDEEP
49152:HuvsT2BRHNRP24WFj6lDtKnox8Rme1sJPYsFYRR:HkoMRHNQwxtKnrRme1iY+
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-