General

  • Target

    babux3.0.exe

  • Size

    5.4MB

  • Sample

    221005-r5vyxaeghq

  • MD5

    98dfc3e7c78d4a7decdc8ec0f37324ae

  • SHA1

    d9913ddccb39d1f6dda99cdea7094c965cd58742

  • SHA256

    ca718d5438efb6c9d9d1ae956d866531f5bd0290c96e87654ef62d34311efe56

  • SHA512

    00323ea1f2ff0fe032a9eadf1a1d769a2e7ee78e07b4238bfb952cf4c16b7d7181027d210e3dd6be59ff23507dfd2a948d95eee8012b9e5caa36b1cca18b4e9b

  • SSDEEP

    98304:QjxV6zRhld9E1BlYb9uto2jgrGeweoSYp2prwvLWaNFXvow17IugzlHbGSZBN7fc:EV8ld98BlON2jnbNswvBXvowJgzl7GSO

Malware Config

Targets

    • Target

      babux3.0.exe

    • Size

      5.4MB

    • MD5

      98dfc3e7c78d4a7decdc8ec0f37324ae

    • SHA1

      d9913ddccb39d1f6dda99cdea7094c965cd58742

    • SHA256

      ca718d5438efb6c9d9d1ae956d866531f5bd0290c96e87654ef62d34311efe56

    • SHA512

      00323ea1f2ff0fe032a9eadf1a1d769a2e7ee78e07b4238bfb952cf4c16b7d7181027d210e3dd6be59ff23507dfd2a948d95eee8012b9e5caa36b1cca18b4e9b

    • SSDEEP

      98304:QjxV6zRhld9E1BlYb9uto2jgrGeweoSYp2prwvLWaNFXvow17IugzlHbGSZBN7fc:EV8ld98BlON2jnbNswvBXvowJgzl7GSO

    • Modifies WinLogon for persistence

    • UAC bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Modifies WinLogon

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

2
T1004

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks