General

  • Target

    0816fb7fbe1c830198d974860841e80634553e9f60ebf20a1a365cc0a043d746

  • Size

    217KB

  • Sample

    221123-m6q9wsbb2w

  • MD5

    6f478e8cf71a4218ed9ad27e3e76ae6b

  • SHA1

    69a6e3d3c8cdeac982ca8016507cce8e48a82591

  • SHA256

    0816fb7fbe1c830198d974860841e80634553e9f60ebf20a1a365cc0a043d746

  • SHA512

    2b8cd78bc0165c2574053e13912a8a80b47ad6c41d57191249e7e0abeadacade03cfbda8e9d2558628a600fd054506734150b03f1e8a8cafa16cb72ede8c5224

  • SSDEEP

    3072:sgXdZt9P6D3XJf45Pfi9PHeqQRYipbBO0rIIUV54HplVN3Pd+KkrzDrm7wq6:se34xcqjQJ/eV5uN/dafOc

Malware Config

Targets

    • Target

      0816fb7fbe1c830198d974860841e80634553e9f60ebf20a1a365cc0a043d746

    • Size

      217KB

    • MD5

      6f478e8cf71a4218ed9ad27e3e76ae6b

    • SHA1

      69a6e3d3c8cdeac982ca8016507cce8e48a82591

    • SHA256

      0816fb7fbe1c830198d974860841e80634553e9f60ebf20a1a365cc0a043d746

    • SHA512

      2b8cd78bc0165c2574053e13912a8a80b47ad6c41d57191249e7e0abeadacade03cfbda8e9d2558628a600fd054506734150b03f1e8a8cafa16cb72ede8c5224

    • SSDEEP

      3072:sgXdZt9P6D3XJf45Pfi9PHeqQRYipbBO0rIIUV54HplVN3Pd+KkrzDrm7wq6:se34xcqjQJ/eV5uN/dafOc

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks