General

  • Target

    c509fb848328f251e790d749b3037318bcd07ee0915b828c42e55410624d5d3b

  • Size

    1.1MB

  • Sample

    221123-terjxagh7z

  • MD5

    0d4aae84494f24db408aa304cdcf0db3

  • SHA1

    699e1c3286a269b87824ba69434dd63d12ea3a53

  • SHA256

    c509fb848328f251e790d749b3037318bcd07ee0915b828c42e55410624d5d3b

  • SHA512

    d677524f6e71527b37f53bb8afb1ac9af9309b28da2f3efeb641cc6994506391aa319238898c279d76540961075ec51590ecedd750619ea03ae55476f8554ff1

  • SSDEEP

    24576:IBvVf+NV8ccc80eqSKuNThT9FKVNcvL7bDokjbjccQ5NBmTHw5POm5+Wr/gCGr:wvVMVfe9KoOcj7bDokjbjccQ5NwbQOmW

Score
9/10

Malware Config

Targets

    • Target

      c509fb848328f251e790d749b3037318bcd07ee0915b828c42e55410624d5d3b

    • Size

      1.1MB

    • MD5

      0d4aae84494f24db408aa304cdcf0db3

    • SHA1

      699e1c3286a269b87824ba69434dd63d12ea3a53

    • SHA256

      c509fb848328f251e790d749b3037318bcd07ee0915b828c42e55410624d5d3b

    • SHA512

      d677524f6e71527b37f53bb8afb1ac9af9309b28da2f3efeb641cc6994506391aa319238898c279d76540961075ec51590ecedd750619ea03ae55476f8554ff1

    • SSDEEP

      24576:IBvVf+NV8ccc80eqSKuNThT9FKVNcvL7bDokjbjccQ5NBmTHw5POm5+Wr/gCGr:wvVMVfe9KoOcj7bDokjbjccQ5NwbQOmW

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks