General
-
Target
Immortal Woofer.exe
-
Size
151.1MB
-
Sample
240906-r7bm2ssbnl
-
MD5
b3a420741d0c3ef020daa5332bcba7b6
-
SHA1
fab88334908bd6ac99ae2e98c7aa7b7412ebfc7d
-
SHA256
035a82de22713080aa43c483c1c1cef63b827bd575a0486996f3a70ce5477e49
-
SHA512
12b7af549557e9b705d4a11bdc023dcd2cab2dcb8673bb359a2ccfa284567f17fa9e97142352f416bc2b0edf198e56d900c69644198822fb16205fc98282f8e6
-
SSDEEP
786432:UPKYRuO3mOTgbr/skQsh/SgaNkbks5GoE3yKZ1fX36n:UPKCuO3mSgfkCKqksYoE3ySA
Behavioral task
behavioral1
Sample
Immortal Woofer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Immortal Woofer.exe
-
Size
151.1MB
-
MD5
b3a420741d0c3ef020daa5332bcba7b6
-
SHA1
fab88334908bd6ac99ae2e98c7aa7b7412ebfc7d
-
SHA256
035a82de22713080aa43c483c1c1cef63b827bd575a0486996f3a70ce5477e49
-
SHA512
12b7af549557e9b705d4a11bdc023dcd2cab2dcb8673bb359a2ccfa284567f17fa9e97142352f416bc2b0edf198e56d900c69644198822fb16205fc98282f8e6
-
SSDEEP
786432:UPKYRuO3mOTgbr/skQsh/SgaNkbks5GoE3yKZ1fX36n:UPKCuO3mSgfkCKqksYoE3ySA
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-