General

  • Target

    47c225894bb7c1989ff01d1b4f3762e681cfeb47bc18d0e6301fc6d24c49a7e1

  • Size

    922KB

  • Sample

    221123-m6ntrsfh93

  • MD5

    aa83f25f549f3c2e8acc14c77eb7ca13

  • SHA1

    428981fc3f4493a298efb207c8522b29f48070b1

  • SHA256

    47c225894bb7c1989ff01d1b4f3762e681cfeb47bc18d0e6301fc6d24c49a7e1

  • SHA512

    f69a0a32642c227979a4aa546f2ade7ec67f26c8d452178e0ed85725b1a1906dbc2663ae6926c3cf8335ab996c82d88e7b458285abe3587baeca1c2a555fe30c

  • SSDEEP

    24576:+MUdhOKdl80ouMK0GdSpnn1dwcOXwSvYq+Vpx0kLJCXZLe8yfxvW/7N+:zUdAJ+MK0GadrOASAqg2Z68yZu/7N+

Malware Config

Targets

    • Target

      47c225894bb7c1989ff01d1b4f3762e681cfeb47bc18d0e6301fc6d24c49a7e1

    • Size

      922KB

    • MD5

      aa83f25f549f3c2e8acc14c77eb7ca13

    • SHA1

      428981fc3f4493a298efb207c8522b29f48070b1

    • SHA256

      47c225894bb7c1989ff01d1b4f3762e681cfeb47bc18d0e6301fc6d24c49a7e1

    • SHA512

      f69a0a32642c227979a4aa546f2ade7ec67f26c8d452178e0ed85725b1a1906dbc2663ae6926c3cf8335ab996c82d88e7b458285abe3587baeca1c2a555fe30c

    • SSDEEP

      24576:+MUdhOKdl80ouMK0GdSpnn1dwcOXwSvYq+Vpx0kLJCXZLe8yfxvW/7N+:zUdAJ+MK0GadrOASAqg2Z68yZu/7N+

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks