General

  • Target

    e1b9f285e2165ad29046ad53a1bb2bb820e2ba01a6ed438a485b955195e094bc

  • Size

    3.4MB

  • Sample

    220817-maewzsebdp

  • MD5

    a25608f773ecd6f862b1acfda8dd8751

  • SHA1

    00aa0fb18b167179edae97826b1ab025a26eb86e

  • SHA256

    e1b9f285e2165ad29046ad53a1bb2bb820e2ba01a6ed438a485b955195e094bc

  • SHA512

    9b5e2eb51a23ca2114b3ba7105638f17733897a452b041ee5e79df554a97a655ed7f373dc6c5496a82ee24f59d14eb5afd39c93701b49f71b63573a1df9e97a4

  • SSDEEP

    98304:kILIwuABPPCYuQqLMFERcrpE6TESI70Zl8ZmAoXOmq2twkIklNFb:vBrHlALMCqdY08ZmAoXOmqnLkl7b

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Targets

    • Target

      Photos/Photos.exe

    • Size

      3.4MB

    • MD5

      701e31c544de5bb9e71a187cb1a8ac0d

    • SHA1

      6fed282b0552f6b46ba5aa4ee7fd808ac3508ef5

    • SHA256

      2394223aee52cdc73a7fb219e8dc7d07ca67570fc0b20f56d9f46571441f26aa

    • SHA512

      0514a3e33bbcab6036a910e8bb57ccadf6a719f20ec780fe29a6e745c2a4eed5e65706094419201c1400ddbc090280594c2d6f0236f0e3b54695e3f72c8696dc

    • SSDEEP

      98304:hxY80N21wvM3vM7/CaMn1FOnGSHwn+tx0vn/j:lr1wkk7Kr8wn+Yvn/j

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      华龙网文化部员工出轨上司过程和图片2.docx.lnk

    • Size

      637B

    • MD5

      8985aa82e561ec2795a1dea38bfe83e6

    • SHA1

      2e8f4e0b62d21bd951ab45b1bf15276f8d4f13ac

    • SHA256

      558a8b82523011b20c870d5d19ee6fab69b361881c8337720a536e4ca0d7d7f4

    • SHA512

      41083bfbb05262babe4fa52af2c0be82f7feaddbba33a552596c3e9e851fbe76a412b12bc5627f25bec8e48b23d85a356d56e05cf5530d9fbbebc584404b1c29

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Tasks