Resubmissions

21-11-2021 07:19

211121-h5vhpsgfc2 10

20-11-2021 20:40

211120-zgal3adbhn 10

20-11-2021 20:36

211120-zdsy8sdbhm 10

General

  • Target

    Paladin.exe

  • Size

    9.5MB

  • Sample

    211120-zgal3adbhn

  • MD5

    60fb5bcf43d7462fba8a16edde2c9524

  • SHA1

    4118779194de403e1b7baf9d5a1dc43ee48130dc

  • SHA256

    86ef1a5f70b1f18a40f4f3bc6f975e29543c6a0266c123276dbc9c3057dcee5b

  • SHA512

    8fac729c002e2d0f7b20eb27caf599ddff1af44c3162ee4f9c5aab355869c577139e2c3d038a186fb6576825f7cca99c2a3cda20e64ea1672c9318992236d94f

Score
10/10

Malware Config

Targets

    • Target

      Paladin.exe

    • Size

      9.5MB

    • MD5

      60fb5bcf43d7462fba8a16edde2c9524

    • SHA1

      4118779194de403e1b7baf9d5a1dc43ee48130dc

    • SHA256

      86ef1a5f70b1f18a40f4f3bc6f975e29543c6a0266c123276dbc9c3057dcee5b

    • SHA512

      8fac729c002e2d0f7b20eb27caf599ddff1af44c3162ee4f9c5aab355869c577139e2c3d038a186fb6576825f7cca99c2a3cda20e64ea1672c9318992236d94f

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks