General
-
Target
CojcsWGNGl.exe
-
Size
6.0MB
-
Sample
240404-3wwdvsea8s
-
MD5
bb3cef2577d61f6db132ea9127687653
-
SHA1
23744c6489204c1c12a7db9f11736826df8612fc
-
SHA256
82c05e788b690d480d56cf4f093a7739d668934acdba574191a6ecc88e843bb5
-
SHA512
700cdf03182d0e86ac7daacda067e7603d0e7fe0d3bff112efb4eb8c968eac2af9033bf4b03e6d05ec92f955a2bc626ab43b52d1125c6ada11beb229a65470a2
-
SSDEEP
49152:xr3uXF+Kb8t3A+Gha2ImSJLuHHuFJajTpYEfSozlqBDMj74oNDdTxfZP:xr3uXFq0haJtin9
Static task
static1
Malware Config
Extracted
bumblebee
proc_123
Targets
-
-
Target
CojcsWGNGl.exe
-
Size
6.0MB
-
MD5
bb3cef2577d61f6db132ea9127687653
-
SHA1
23744c6489204c1c12a7db9f11736826df8612fc
-
SHA256
82c05e788b690d480d56cf4f093a7739d668934acdba574191a6ecc88e843bb5
-
SHA512
700cdf03182d0e86ac7daacda067e7603d0e7fe0d3bff112efb4eb8c968eac2af9033bf4b03e6d05ec92f955a2bc626ab43b52d1125c6ada11beb229a65470a2
-
SSDEEP
49152:xr3uXF+Kb8t3A+Gha2ImSJLuHHuFJajTpYEfSozlqBDMj74oNDdTxfZP:xr3uXFq0haJtin9
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-