General

  • Target

    4dc884fa819d6b9acbf4ea4e4d3e26e8e8613cc93de290ab8628e571d43efb31

  • Size

    177KB

  • Sample

    221123-lkllvafa7v

  • MD5

    306eeb997d07f5140ab2d5bf5472192a

  • SHA1

    d34f3e346a232332095e54a0f33aa01513fd7516

  • SHA256

    4dc884fa819d6b9acbf4ea4e4d3e26e8e8613cc93de290ab8628e571d43efb31

  • SHA512

    a1c104156c5f64e8d93983db526d46e87dbc4c9ff8375db8f3bb94d88fe90c51a3999e1ddc8f47eab88a3245b1f093f070f644f8d081355c98451744eb53d6f8

  • SSDEEP

    3072:oQIURTXJ3wyZQPKckaO2IpSD+b/xIUtCYY0mWskalU/ZgZApBvejrlvo1:osRwDy/i+dI3YY0mWs3diYjC1

Malware Config

Targets

    • Target

      4dc884fa819d6b9acbf4ea4e4d3e26e8e8613cc93de290ab8628e571d43efb31

    • Size

      177KB

    • MD5

      306eeb997d07f5140ab2d5bf5472192a

    • SHA1

      d34f3e346a232332095e54a0f33aa01513fd7516

    • SHA256

      4dc884fa819d6b9acbf4ea4e4d3e26e8e8613cc93de290ab8628e571d43efb31

    • SHA512

      a1c104156c5f64e8d93983db526d46e87dbc4c9ff8375db8f3bb94d88fe90c51a3999e1ddc8f47eab88a3245b1f093f070f644f8d081355c98451744eb53d6f8

    • SSDEEP

      3072:oQIURTXJ3wyZQPKckaO2IpSD+b/xIUtCYY0mWskalU/ZgZApBvejrlvo1:osRwDy/i+dI3YY0mWs3diYjC1

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks