Overview
overview
9Static
static
7unl.rar
windows7-x64
3unl.rar
windows10-2004-x64
3unl/Spotify.cfg
windows7-x64
3unl/Spotify.cfg
windows10-2004-x64
3unl/blobs/a.ini
windows7-x64
1unl/blobs/a.ini
windows10-2004-x64
1unl/blobs/b.ini
windows7-x64
1unl/blobs/b.ini
windows10-2004-x64
1unl/unl_cracked.exe
windows7-x64
9unl/unl_cracked.exe
windows10-2004-x64
9General
-
Target
unl.rar
-
Size
4.4MB
-
Sample
240814-bmewzaycll
-
MD5
6ba19488c35123fc1e3973361bb1dd42
-
SHA1
7916a608fd178d83b94718b78a4d841157f5f831
-
SHA256
3ecc7cb0d0c4d0509df3506fe19199daf409011d24c2163eb035919cfd3f1b85
-
SHA512
14928e3b249f66a8b49c4afb11715b1e0921f0e7aba6449865a00ecb9e0a8cddf7bc6b6b56a0d984ec4018096e75a0b2d4a0f016de0201fdde6cb48829ecd143
-
SSDEEP
98304:E6amRFwnveHxouhYhVk9cF7i+xW12fVyxUt21KZ0CmOv8dfEtYItW5zhmEI:E6JBHxodhVMcF7ikWOm+Z0C30ds5eVmt
Behavioral task
behavioral1
Sample
unl.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
unl.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
unl/Spotify.cfg
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
unl/Spotify.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
unl/blobs/a.ini
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
unl/blobs/a.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
unl/blobs/b.ini
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
unl/blobs/b.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
unl/unl_cracked.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
unl.rar
-
Size
4.4MB
-
MD5
6ba19488c35123fc1e3973361bb1dd42
-
SHA1
7916a608fd178d83b94718b78a4d841157f5f831
-
SHA256
3ecc7cb0d0c4d0509df3506fe19199daf409011d24c2163eb035919cfd3f1b85
-
SHA512
14928e3b249f66a8b49c4afb11715b1e0921f0e7aba6449865a00ecb9e0a8cddf7bc6b6b56a0d984ec4018096e75a0b2d4a0f016de0201fdde6cb48829ecd143
-
SSDEEP
98304:E6amRFwnveHxouhYhVk9cF7i+xW12fVyxUt21KZ0CmOv8dfEtYItW5zhmEI:E6JBHxodhVMcF7ikWOm+Z0C30ds5eVmt
Score3/10 -
-
-
Target
unl/Spotify.cfg
-
Size
51B
-
MD5
a31638f636f3cff044f77338c8a850ab
-
SHA1
ca46698adb72410d35bb56989a369880e503756f
-
SHA256
357a0410620a468d333a5235ec424a3bbc8b330ba16968f381e1c8ffa89dff39
-
SHA512
aafd96f0fda67c76d1cef2ed8ade0717baec758a99e6e110c62c79ae215a5dd1e90c7624adaecd9a68153c94b7ef69e7cc09e1a879ad4568d08b0170e6b66f85
Score3/10 -
-
-
Target
unl/blobs/a.ini
-
Size
140B
-
MD5
f2c2615412f9de59726c794f8c0de4cd
-
SHA1
4b598a54a07f74e13f0e5c4cbe9a776f67a6e530
-
SHA256
7a7cf6e122964410f27a012803588001c1febb79b2f435f7f545a77f32928843
-
SHA512
a6d12943b9574e218ec3ef6a016b1bf396d05601cf12accf11636eb6e9458ae3601a0fcb1ddac641f009f2bd918bb6533589aa82cf13496335de002aee8341bc
Score1/10 -
-
-
Target
unl/blobs/b.ini
-
Size
16B
-
MD5
579d4b01df80191d7457f1449cdf516c
-
SHA1
ed66582816647cbfa1bef768e8eadf4240feba64
-
SHA256
b7f5af4f2b447ea8a36df2db3db7ecb3790385446e1b7f1958c02770ab907077
-
SHA512
f10b6f9019ea5048a9507c0983fc99a2e038a04e27f4d87463ed5770f8932a6587dca3636613e9b474be919f2a83d621e88abaadc7ad302b4b76c764ad1fe585
Score1/10 -
-
-
Target
unl/unl_cracked.exe
-
Size
4.6MB
-
MD5
6bd14ba77cb025fc393ab45feb780d20
-
SHA1
a6b483d04c243e473ddef816739549449b561fd9
-
SHA256
6ffce8c5338024d310dc6ffc9691fa1c7d337be4d6fcde62733c90ad6a47e35e
-
SHA512
f16600a68fe7254f8bd7dd3882b7def64aad293861110e381545ea01691cd0c4ae035facf270f37895deafd5cd23d951ffc807976022d1fff341c720f907d1f9
-
SSDEEP
98304:pzwC9MBykeG9JSkq4Qj7RqwDaQ3Y7el+KzMjHFSFxgm04mtVP5gMRA5J:pzwgfkP9JdZQjNDagY7e7Mj+xMHXvs
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-