General

  • Target

    Magicmida.exe

  • Size

    4.8MB

  • Sample

    240428-fttqxsha5v

  • MD5

    cbd33d0e1cace68f044d3f1b44bbba7b

  • SHA1

    8a9c635d76cd59147c294bc8ad890d317f95ebcd

  • SHA256

    b724e1d087d12cf6b9ada01bfa555a3047250546f3add75b1e9086c111633b9c

  • SHA512

    cf614895009d93a8c8769bfb0691c78a7b1a23ce2729d6346fa19487b4bf598bdb6f3ed7da43a571137d8d09080ffdf1cfa171080941e28b34cb2450b296f35b

  • SSDEEP

    98304:YXzhW148Pd+Tf1mpcOldJQ3/Vk0dRWRbbVcNbCyfioB:sFK4s0TfLOdo/pdR6w

Malware Config

Targets

    • Target

      Magicmida.exe

    • Size

      4.8MB

    • MD5

      cbd33d0e1cace68f044d3f1b44bbba7b

    • SHA1

      8a9c635d76cd59147c294bc8ad890d317f95ebcd

    • SHA256

      b724e1d087d12cf6b9ada01bfa555a3047250546f3add75b1e9086c111633b9c

    • SHA512

      cf614895009d93a8c8769bfb0691c78a7b1a23ce2729d6346fa19487b4bf598bdb6f3ed7da43a571137d8d09080ffdf1cfa171080941e28b34cb2450b296f35b

    • SSDEEP

      98304:YXzhW148Pd+Tf1mpcOldJQ3/Vk0dRWRbbVcNbCyfioB:sFK4s0TfLOdo/pdR6w

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks