General

  • Target

    f345257ed36358bf1f3fc0bbcf43bd4d4015393a090521c475f7d1880dd32519

  • Size

    215KB

  • Sample

    221123-mwfemsac8z

  • MD5

    af597217242b99d0071e994afbd92855

  • SHA1

    8802cd3eca4b6e274ff4df3fbbb4e7bb534bf90c

  • SHA256

    f345257ed36358bf1f3fc0bbcf43bd4d4015393a090521c475f7d1880dd32519

  • SHA512

    de1ce56f2e15f9d3637c6b84c836028ffe615d5bdefee2604daad9d4a819e6748b2264bd4905c46437c5ab64ee15be25dec409ac33cf0214ac456543359ed8dd

  • SSDEEP

    3072:qgXdZt9P6D3XJE45Wfi8PHeqPrIIUV54lRYipbBOQpBDrm7wqnVN3Pd+KkrD:qe34+VqADeV50JbfO7N/d6

Malware Config

Targets

    • Target

      f345257ed36358bf1f3fc0bbcf43bd4d4015393a090521c475f7d1880dd32519

    • Size

      215KB

    • MD5

      af597217242b99d0071e994afbd92855

    • SHA1

      8802cd3eca4b6e274ff4df3fbbb4e7bb534bf90c

    • SHA256

      f345257ed36358bf1f3fc0bbcf43bd4d4015393a090521c475f7d1880dd32519

    • SHA512

      de1ce56f2e15f9d3637c6b84c836028ffe615d5bdefee2604daad9d4a819e6748b2264bd4905c46437c5ab64ee15be25dec409ac33cf0214ac456543359ed8dd

    • SSDEEP

      3072:qgXdZt9P6D3XJE45Wfi8PHeqPrIIUV54lRYipbBOQpBDrm7wqnVN3Pd+KkrD:qe34+VqADeV50JbfO7N/d6

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks