General

  • Target

    50153b21abcf5baf17ef600b56cec717.exe

  • Size

    3.5MB

  • Sample

    221109-h2nwraefe5

  • MD5

    50153b21abcf5baf17ef600b56cec717

  • SHA1

    6ea0838ace157f1c71bca27acffd0fe57a9027e1

  • SHA256

    99c08c22c427d7b3ad1d8ac8bc371597030cd477b15dfb494a3a66d65fbc99dd

  • SHA512

    765a949f58b680302c68cdc87ae20decc433eacbaf477d1da7d26800e30f1db1ca12bc007f79b500cfc684e6f91c08fc8c0a76d57cb67c63231680287a18b1f0

  • SSDEEP

    98304:B9IaoMTrov0++pMy12yVMVVMG6BbKUbF4:B+W/m0+y9eVVMGkDB4

Malware Config

Targets

    • Target

      50153b21abcf5baf17ef600b56cec717.exe

    • Size

      3.5MB

    • MD5

      50153b21abcf5baf17ef600b56cec717

    • SHA1

      6ea0838ace157f1c71bca27acffd0fe57a9027e1

    • SHA256

      99c08c22c427d7b3ad1d8ac8bc371597030cd477b15dfb494a3a66d65fbc99dd

    • SHA512

      765a949f58b680302c68cdc87ae20decc433eacbaf477d1da7d26800e30f1db1ca12bc007f79b500cfc684e6f91c08fc8c0a76d57cb67c63231680287a18b1f0

    • SSDEEP

      98304:B9IaoMTrov0++pMy12yVMVVMG6BbKUbF4:B+W/m0+y9eVVMGkDB4

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks