General

  • Target

    fd01777f82f5ed0ee6f226fcb3533d0b4e52c658a73c42f246fd6541f8d09c26

  • Size

    4.3MB

  • Sample

    221124-tzkl4afc58

  • MD5

    7334b6f53b275266d269cb5da0b5499a

  • SHA1

    9aaec62f065c002f2073ce2e730152e65d058a57

  • SHA256

    fd01777f82f5ed0ee6f226fcb3533d0b4e52c658a73c42f246fd6541f8d09c26

  • SHA512

    3b612f0e30c94eb97483b0706fa2aea3dfc3792619d16f95e4a15613a817f9c8b6dedf3278fcbb896858c7ab897606af5b8a06aff07ff6126c9ffff542ddedce

  • SSDEEP

    98304:kKewCjLN/HpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP+:k1xfXdjjqPdDsDbsU0akJyxL405+fiX

Score
9/10

Malware Config

Targets

    • Target

      fd01777f82f5ed0ee6f226fcb3533d0b4e52c658a73c42f246fd6541f8d09c26

    • Size

      4.3MB

    • MD5

      7334b6f53b275266d269cb5da0b5499a

    • SHA1

      9aaec62f065c002f2073ce2e730152e65d058a57

    • SHA256

      fd01777f82f5ed0ee6f226fcb3533d0b4e52c658a73c42f246fd6541f8d09c26

    • SHA512

      3b612f0e30c94eb97483b0706fa2aea3dfc3792619d16f95e4a15613a817f9c8b6dedf3278fcbb896858c7ab897606af5b8a06aff07ff6126c9ffff542ddedce

    • SSDEEP

      98304:kKewCjLN/HpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP+:k1xfXdjjqPdDsDbsU0akJyxL405+fiX

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks