General

  • Target

    cd98fd36bb86c766619a6b37fa1c1cadd828c76789730f65a84360b20d14ccf2

  • Size

    4.2MB

  • Sample

    211029-bsllpshbel

  • MD5

    9c50d95dc3393f2f80cac58a9f5b93f7

  • SHA1

    d33acac96477bfc8104e7ddb104992a7f2a41858

  • SHA256

    cd98fd36bb86c766619a6b37fa1c1cadd828c76789730f65a84360b20d14ccf2

  • SHA512

    bb822cc965febd592066bc0c6ea93b026de40ec834374fed109bc4fd508fa33a6a1eb626f374f8be67229c1ce0dba3a4dfad2807618399f3a3470c014412c93f

Malware Config

Targets

    • Target

      cd98fd36bb86c766619a6b37fa1c1cadd828c76789730f65a84360b20d14ccf2

    • Size

      4.2MB

    • MD5

      9c50d95dc3393f2f80cac58a9f5b93f7

    • SHA1

      d33acac96477bfc8104e7ddb104992a7f2a41858

    • SHA256

      cd98fd36bb86c766619a6b37fa1c1cadd828c76789730f65a84360b20d14ccf2

    • SHA512

      bb822cc965febd592066bc0c6ea93b026de40ec834374fed109bc4fd508fa33a6a1eb626f374f8be67229c1ce0dba3a4dfad2807618399f3a3470c014412c93f

    • suricata: ET MALWARE Generic .bin download from Dotted Quad

      suricata: ET MALWARE Generic .bin download from Dotted Quad

    • Executes dropped EXE

    • Modifies Windows Firewall

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks