General

  • Target

    ffc153b44cf9232a5256efdc907d658af451c08bd5b60657eb4dfad464639a8b.exe

  • Size

    11.0MB

  • Sample

    220719-s51ptsfaf9

  • MD5

    88dfe0c8151c63d9ed0af236d4d64945

  • SHA1

    36fd988674e2148cb6f9de9fd23ebefb935de164

  • SHA256

    ffc153b44cf9232a5256efdc907d658af451c08bd5b60657eb4dfad464639a8b

  • SHA512

    60c065504e3f34b3d8424749bdd9f964bc3dc7cb46ba8a60cd898092459b4f5163ebcb71b5c621a2feb2fb0db43ef824bbe92e8f1558b864240a33ae01ecf9c0

Malware Config

Targets

    • Target

      ffc153b44cf9232a5256efdc907d658af451c08bd5b60657eb4dfad464639a8b.exe

    • Size

      11.0MB

    • MD5

      88dfe0c8151c63d9ed0af236d4d64945

    • SHA1

      36fd988674e2148cb6f9de9fd23ebefb935de164

    • SHA256

      ffc153b44cf9232a5256efdc907d658af451c08bd5b60657eb4dfad464639a8b

    • SHA512

      60c065504e3f34b3d8424749bdd9f964bc3dc7cb46ba8a60cd898092459b4f5163ebcb71b5c621a2feb2fb0db43ef824bbe92e8f1558b864240a33ae01ecf9c0

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks