General

  • Target

    b61426b61b8cdfa3d70c55176737fa76305c20e33a9c89f3e0035aaeac7266a9

  • Size

    212KB

  • Sample

    221123-m48fdsfg87

  • MD5

    adb97d95ef38e19ee05bb878269fc15b

  • SHA1

    f05b134c52c28ef75085b702eb394d79fc3b2f62

  • SHA256

    b61426b61b8cdfa3d70c55176737fa76305c20e33a9c89f3e0035aaeac7266a9

  • SHA512

    add5dca412215932e37bf3814225f3807c290d62c1410a54002500d8260720c028c72239f4248fa6fa50005e0dc05fa4b05c2da58e0f1dd259a30c7e49f3f290

  • SSDEEP

    6144:YQqOU1zmDy198ZNMT5Gz5ndp037sjx5H1:rU1zmq98ZKAzBPo7sd

Malware Config

Targets

    • Target

      b61426b61b8cdfa3d70c55176737fa76305c20e33a9c89f3e0035aaeac7266a9

    • Size

      212KB

    • MD5

      adb97d95ef38e19ee05bb878269fc15b

    • SHA1

      f05b134c52c28ef75085b702eb394d79fc3b2f62

    • SHA256

      b61426b61b8cdfa3d70c55176737fa76305c20e33a9c89f3e0035aaeac7266a9

    • SHA512

      add5dca412215932e37bf3814225f3807c290d62c1410a54002500d8260720c028c72239f4248fa6fa50005e0dc05fa4b05c2da58e0f1dd259a30c7e49f3f290

    • SSDEEP

      6144:YQqOU1zmDy198ZNMT5Gz5ndp037sjx5H1:rU1zmq98ZKAzBPo7sd

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks