General

  • Target

    y7E48.tmp.dll

  • Size

    820KB

  • Sample

    220617-w5hqsschfp

  • MD5

    e9334bc1f6db1fe8db13e17c47299c74

  • SHA1

    da12f863b1c4f437efc8a5faa8e04e32439eb479

  • SHA256

    a7628a09046bc9f9144ecf506ef5a399befb8a985b028db8032a40ae0f96cf86

  • SHA512

    b2e10ccb89dc2ec23a824cf9c39d76c698f3f1f4a3498c1fcc7b68a73a9a15e28aac512a010c769582b965d544ee558cfdc2e59a672dd7e782826e9776640d95

Malware Config

Targets

    • Target

      y7E48.tmp.dll

    • Size

      820KB

    • MD5

      e9334bc1f6db1fe8db13e17c47299c74

    • SHA1

      da12f863b1c4f437efc8a5faa8e04e32439eb479

    • SHA256

      a7628a09046bc9f9144ecf506ef5a399befb8a985b028db8032a40ae0f96cf86

    • SHA512

      b2e10ccb89dc2ec23a824cf9c39d76c698f3f1f4a3498c1fcc7b68a73a9a15e28aac512a010c769582b965d544ee558cfdc2e59a672dd7e782826e9776640d95

    • Detects SVCReady loader

    • SVCReady

      SVCReady is a malware loader first seen in April 2022.

    • suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent

      suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent

    • suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2

      suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks