General

  • Target

    c477c5c59576ceabb13b2b288aae566c3d846415e9806530e88a31c3d86662b7

  • Size

    14.0MB

  • Sample

    220208-vkeb7sbdbk

  • MD5

    eb45829fd57258da08125539d08ca05c

  • SHA1

    cd7a69ecbd857368f6c631c9e71d17f2cbfd178e

  • SHA256

    c477c5c59576ceabb13b2b288aae566c3d846415e9806530e88a31c3d86662b7

  • SHA512

    c6443c6adc9c381e96b6d98858626287cc2a6dc1bbb8d91b4f77e46e29e798698b5e075ff45f80a53dc21db128dced36c2ba10f4ec1d30dc482e28cdb2d7f03a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://files.catbox.moe/qifm5s.ex_

Targets

    • Target

      c477c5c59576ceabb13b2b288aae566c3d846415e9806530e88a31c3d86662b7

    • Size

      14.0MB

    • MD5

      eb45829fd57258da08125539d08ca05c

    • SHA1

      cd7a69ecbd857368f6c631c9e71d17f2cbfd178e

    • SHA256

      c477c5c59576ceabb13b2b288aae566c3d846415e9806530e88a31c3d86662b7

    • SHA512

      c6443c6adc9c381e96b6d98858626287cc2a6dc1bbb8d91b4f77e46e29e798698b5e075ff45f80a53dc21db128dced36c2ba10f4ec1d30dc482e28cdb2d7f03a

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

3
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks