Overview
overview
9Static
static
luokwgjyfz...��.url
windows7-x64
1luokwgjyfz...��.url
windows10-2004-x64
1luokwgjyfz...��.url
windows7-x64
1luokwgjyfz...��.url
windows10-2004-x64
1luokwgjyfz...��.exe
windows7-x64
9luokwgjyfz...��.exe
windows10-2004-x64
9setup_90000170.exe
windows7-x64
7setup_90000170.exe
windows10-2004-x64
7General
-
Target
834f924e9cda25a052469f30da9f32f6966baf723afdc3d98ac41e6de9ae2610
-
Size
11.6MB
-
Sample
221124-ges2hsfd9z
-
MD5
610bc825d92d798e06b730e29db0b474
-
SHA1
1affbf78b364269b367237548842dc463088564a
-
SHA256
834f924e9cda25a052469f30da9f32f6966baf723afdc3d98ac41e6de9ae2610
-
SHA512
6dfe8b26202361d2f8e3fbcdc6c7e218559fed4b32da0730659a81df1ad8105432fbfbcd9713c54b37074019a9d77b849e08724886513c47ad51a0875624a866
-
SSDEEP
196608:Hh9zqWJlKxtPgAXXBapaFwA1sFf+NYESniPLEJtWDVG/dQ12gBECRG1Xa/Yf:Hh9zxEG0B3FwA18iHKwl1aDq/4
Static task
static1
Behavioral task
behavioral1
Sample
luokwgjyfz/西西单机游戏.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
luokwgjyfz/西西单机游戏.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
luokwgjyfz/西西软件园_百度搜索.url
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
luokwgjyfz/西西软件园_百度搜索.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
luokwgjyfz/记忆ゞ神辅.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
luokwgjyfz/记忆ゞ神辅.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
setup_90000170.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
setup_90000170.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
luokwgjyfz/西西单机游戏.url
-
Size
151B
-
MD5
0e86176b4bc94b9eb1a69e62ff7d662f
-
SHA1
402e7dc0c5afb8ce4a3fa8436a443752347f8000
-
SHA256
35db64621f578341c0fcfd92ecaf86a60a0f60f8fddb4cea902886542820c9df
-
SHA512
5f2786850d332889c18a5f6911fa995320a310fceded559c131c4b981ef989ed99df48c2d55b1daf325dcb0a5fa57d0a5de6457b9daeba1bc2fd5fe60aff2958
Score1/10 -
-
-
Target
luokwgjyfz/西西软件园_百度搜索.url
-
Size
206B
-
MD5
0a017936d46c03a7dde04813ccced0da
-
SHA1
ea63079b676c2c70d2d8f708f432aa87c6b52922
-
SHA256
75d652edc92941a4997a2fe96573aa37a13a587aeb9024638841b3a81170b8c5
-
SHA512
d14da50099e2e77e4a5ffba4932cd5ee8c75eeffba86d9e702453056a5173acc84757ca44a46da2bea0a3589500035f39a971cb7a3fd38685ee94be526b7fc3b
Score1/10 -
-
-
Target
luokwgjyfz/记忆ゞ神辅.exe
-
Size
10.5MB
-
MD5
fe5747fb7cb53fa02f9a83c1344a817d
-
SHA1
ca609fd11e4eb75011485e1aa9a06b962bd66a15
-
SHA256
efb77938fa94868cfc797dbbe02bfe42b685a45d370e47cf546f64ecdcbfc932
-
SHA512
0d7ff6bea905f60b7f56438386347d74539edfe3bc9cdb46741caf1b3f8b274fa3b026caf4523980434b30455753b793bddf1f3771460b94d083866c8048d4c6
-
SSDEEP
196608:Gty7LfsmVluDbdmYh0pf8/UGy98zv63h6FxQ9PgNgaDwGz1j3hakw:14muvdmYhUKHOg9N4Kok
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
setup_90000170.exe
-
Size
1.4MB
-
MD5
f34e66fb58d8cace441e9a6fdd9998aa
-
SHA1
4b719111844a8788ede32bfd0a93ee0ce1e7410f
-
SHA256
53e01b61ccf9868ab79aad471e84226b2090f8cba87fa0ec0fb487755e8c19d4
-
SHA512
4d4072ce78398252ae03591bf886ae8602c49dfc8dc33b31de279bde402714c2a91d38c2ec984077a9b67e4610ec9dea213dc02d381382721c2ea42ae6dc9ab0
-
SSDEEP
24576:+CgIYG5yhyeFZGi9LEoXjpANX4JzOi30lZl8nNyUcyqWWaDwKbTI1yQEKo9gt6K:tYWyhyeF0i9LEoXjMI07+cybWeY1yQE6
Score7/10-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-