General

  • Target

    REG.BR1.OMUGSUHGFCUERBQAJSZUPYIGQIMJSPÊ.msi

  • Size

    282KB

  • Sample

    210709-2f82571fse

  • MD5

    7cc4b16624dada727a8ea786ba38d180

  • SHA1

    fba91a526dfdba7c49a337beed687fba59b4157f

  • SHA256

    222247618a9b4a916007666b7e1911a36890b40b46a6231fe0356c43bcfd04f6

  • SHA512

    3c58d9f8c255a75e2a9b5fa1e777b5b5517050a106ec512da3c5ab10ab6e0d292bc4eddb42105e86286ccffa75cf0727d7c0236db993c21539f408b29de50adf

Malware Config

Targets

    • Target

      REG.BR1.OMUGSUHGFCUERBQAJSZUPYIGQIMJSPÊ.msi

    • Size

      282KB

    • MD5

      7cc4b16624dada727a8ea786ba38d180

    • SHA1

      fba91a526dfdba7c49a337beed687fba59b4157f

    • SHA256

      222247618a9b4a916007666b7e1911a36890b40b46a6231fe0356c43bcfd04f6

    • SHA512

      3c58d9f8c255a75e2a9b5fa1e777b5b5517050a106ec512da3c5ab10ab6e0d292bc4eddb42105e86286ccffa75cf0727d7c0236db993c21539f408b29de50adf

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks