General

  • Target

    2b54ccc44e89581b1005e8b6f24a7822

  • Size

    4.6MB

  • Sample

    210727-qpnne9h17s

  • MD5

    2b54ccc44e89581b1005e8b6f24a7822

  • SHA1

    d7de533078a3d1204e1a0c9440501928e0cf1285

  • SHA256

    aef5c612c2920526ea0ccc636e689417885c2dfb17793de9a259d6ced6fdd7cc

  • SHA512

    c8e1bf41b5dfe40bbf39cc534099c5224851ba8b97f545262eac0790c3cc3bcc7c1d381e6f95c4c2884d3979e1ee8e51b615adc182a726d591c5eeefec5ad120

Malware Config

Targets

    • Target

      2b54ccc44e89581b1005e8b6f24a7822

    • Size

      4.6MB

    • MD5

      2b54ccc44e89581b1005e8b6f24a7822

    • SHA1

      d7de533078a3d1204e1a0c9440501928e0cf1285

    • SHA256

      aef5c612c2920526ea0ccc636e689417885c2dfb17793de9a259d6ced6fdd7cc

    • SHA512

      c8e1bf41b5dfe40bbf39cc534099c5224851ba8b97f545262eac0790c3cc3bcc7c1d381e6f95c4c2884d3979e1ee8e51b615adc182a726d591c5eeefec5ad120

    • suricata: ET MALWARE Generic gate[.].php GET with minimal headers

    • suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks