General

  • Target

    dadd40388f9a905045d64f97926682305814135365ca274f5bc83ce27f71abd0

  • Size

    3.5MB

  • Sample

    220211-3qtyvadfh2

  • MD5

    dec26ba8f682fe0dc0608af5e882544a

  • SHA1

    a7298d5c29445ad9d34eee31bd89a9962915f84b

  • SHA256

    dadd40388f9a905045d64f97926682305814135365ca274f5bc83ce27f71abd0

  • SHA512

    1caf7547171a4365dc16bd3b6d491145dfef84b38d85852a7881ba976a271d901c0d2d469c7992057e5b5b473f3116863ee7a8a9ec8b26a02f8f37e76042286c

Malware Config

Targets

    • Target

      dadd40388f9a905045d64f97926682305814135365ca274f5bc83ce27f71abd0

    • Size

      3.5MB

    • MD5

      dec26ba8f682fe0dc0608af5e882544a

    • SHA1

      a7298d5c29445ad9d34eee31bd89a9962915f84b

    • SHA256

      dadd40388f9a905045d64f97926682305814135365ca274f5bc83ce27f71abd0

    • SHA512

      1caf7547171a4365dc16bd3b6d491145dfef84b38d85852a7881ba976a271d901c0d2d469c7992057e5b5b473f3116863ee7a8a9ec8b26a02f8f37e76042286c

    • Modifies security service

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks