General

  • Target

    b7c5be5af6dff0290406988b0225b04c9805d0d3bc1298e695c2381c8e1a776c

  • Size

    107KB

  • Sample

    221124-gqhpxsdb82

  • MD5

    baf1358bf7f8d49885fa673397c090cc

  • SHA1

    981432bcce74378c8c215491e19ea83f0970d9c7

  • SHA256

    b7c5be5af6dff0290406988b0225b04c9805d0d3bc1298e695c2381c8e1a776c

  • SHA512

    6ef92f1a5b4e1e3359556af8594cb36a4357943d4e6d73610273843bf93564fafd8b3fd382adcdbe8318f4a1da83d11e46cdacb1078d1d3927f17ad212d4aeb7

  • SSDEEP

    3072:nwJ52Y7ZoH5XJavdhkWCEaOkkjWe/rmDhlpUH6RQAjQ:nwHysvPzHaMaEYAaRQAjQ

Score
9/10

Malware Config

Targets

    • Target

      b7c5be5af6dff0290406988b0225b04c9805d0d3bc1298e695c2381c8e1a776c

    • Size

      107KB

    • MD5

      baf1358bf7f8d49885fa673397c090cc

    • SHA1

      981432bcce74378c8c215491e19ea83f0970d9c7

    • SHA256

      b7c5be5af6dff0290406988b0225b04c9805d0d3bc1298e695c2381c8e1a776c

    • SHA512

      6ef92f1a5b4e1e3359556af8594cb36a4357943d4e6d73610273843bf93564fafd8b3fd382adcdbe8318f4a1da83d11e46cdacb1078d1d3927f17ad212d4aeb7

    • SSDEEP

      3072:nwJ52Y7ZoH5XJavdhkWCEaOkkjWe/rmDhlpUH6RQAjQ:nwHysvPzHaMaEYAaRQAjQ

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks