General

  • Target

    bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36

  • Size

    24.0MB

  • Sample

    220319-przntshher

  • MD5

    320aa03413b0e294938db1deccfc314e

  • SHA1

    14c2a2915801555144bf0664e1d90bde6f5cd8c0

  • SHA256

    bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36

  • SHA512

    e7c3362b4ac71db417658ca2fe801fab49b108fff34343e46883ebef5f401990a6adca95b608e9ed75a6ae83d165eaa0602bb174392f6c894d943cf633ec3de5

Malware Config

Targets

    • Target

      bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36

    • Size

      24.0MB

    • MD5

      320aa03413b0e294938db1deccfc314e

    • SHA1

      14c2a2915801555144bf0664e1d90bde6f5cd8c0

    • SHA256

      bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36

    • SHA512

      e7c3362b4ac71db417658ca2fe801fab49b108fff34343e46883ebef5f401990a6adca95b608e9ed75a6ae83d165eaa0602bb174392f6c894d943cf633ec3de5

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • PlugX Rat Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks