General
-
Target
19651c0211e7bf0afc579a9323bcceec.exe
-
Size
2.0MB
-
Sample
221117-qlm9aaed97
-
MD5
19651c0211e7bf0afc579a9323bcceec
-
SHA1
668d74d53655f49cff9e70f3ddfe8a6fb1bf843b
-
SHA256
3c0bc91e69e6a63c13a5c5109a5910701a29864884502454bfd54d9717d052a2
-
SHA512
29fbd7fcff195ffbcd5bba22b1297ef5c156ecce7d9bc5942ad8f9b23e8e624abef8b24b69f66b9ceb3006a1e523a1cd3e36801def1e4336f8d6b016b7f6d430
-
SSDEEP
49152:hIbxKguq8E0dtzo0qDVn9bd4jmRjoEHjqUPTBFJeHo:jgadpo0qBlmjmRjoEHjqwFJeH
Static task
static1
Behavioral task
behavioral1
Sample
19651c0211e7bf0afc579a9323bcceec.exe
Resource
win7-20220812-en
Malware Config
Extracted
systembc
slavelever.info:4248
slavelevereoewl.info:4248
Targets
-
-
Target
19651c0211e7bf0afc579a9323bcceec.exe
-
Size
2.0MB
-
MD5
19651c0211e7bf0afc579a9323bcceec
-
SHA1
668d74d53655f49cff9e70f3ddfe8a6fb1bf843b
-
SHA256
3c0bc91e69e6a63c13a5c5109a5910701a29864884502454bfd54d9717d052a2
-
SHA512
29fbd7fcff195ffbcd5bba22b1297ef5c156ecce7d9bc5942ad8f9b23e8e624abef8b24b69f66b9ceb3006a1e523a1cd3e36801def1e4336f8d6b016b7f6d430
-
SSDEEP
49152:hIbxKguq8E0dtzo0qDVn9bd4jmRjoEHjqUPTBFJeHo:jgadpo0qBlmjmRjoEHjqwFJeH
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-