General

  • Target

    844b7e033c078ed67b52558b5d891741

  • Size

    202KB

  • Sample

    210926-synrpafah9

  • MD5

    844b7e033c078ed67b52558b5d891741

  • SHA1

    cff2a6b3b726455b9ed898aa766f2363189642bc

  • SHA256

    eff8a484eafd5ebdf57845e6a656793520bdddf5469ea4a95eaa578e8bca6c50

  • SHA512

    537487e3d6b6be107530e36547f3b66d61cce29d127ac1ce9ad34d2eb1e60ddb4d368a6c8e1366ef307982ffba507aff87ca2a9590e9fb58ad74b7c628a6dfca

Malware Config

Targets

    • Target

      844b7e033c078ed67b52558b5d891741

    • Size

      202KB

    • MD5

      844b7e033c078ed67b52558b5d891741

    • SHA1

      cff2a6b3b726455b9ed898aa766f2363189642bc

    • SHA256

      eff8a484eafd5ebdf57845e6a656793520bdddf5469ea4a95eaa578e8bca6c50

    • SHA512

      537487e3d6b6be107530e36547f3b66d61cce29d127ac1ce9ad34d2eb1e60ddb4d368a6c8e1366ef307982ffba507aff87ca2a9590e9fb58ad74b7c628a6dfca

    • Modifies security service

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks