General

  • Target

    b32403ba3ead52bd556d1eddcbb183554f1c9bb3803d42070f656042f4513dcf

  • Size

    6.3MB

  • Sample

    221206-j1qvdscd71

  • MD5

    a8d1945a5f0b606139e0f8f620f491cd

  • SHA1

    28f735f524ff69cefdfd1c948204037ed6c0da84

  • SHA256

    b32403ba3ead52bd556d1eddcbb183554f1c9bb3803d42070f656042f4513dcf

  • SHA512

    b130b2cbd99e249e9c74c660b2c4ac99accb6892de6bf9aea257473cd01d0465db9c1be650c01dca678fea4900fdc433f419577362de2f56255b1d61ca08c173

  • SSDEEP

    196608:ZL0AtVPV9JWwIPfL5Vc03FGPDuqxg5EHBktj:RbJEH/cdPDuqysBktj

Malware Config

Targets

    • Target

      b32403ba3ead52bd556d1eddcbb183554f1c9bb3803d42070f656042f4513dcf

    • Size

      6.3MB

    • MD5

      a8d1945a5f0b606139e0f8f620f491cd

    • SHA1

      28f735f524ff69cefdfd1c948204037ed6c0da84

    • SHA256

      b32403ba3ead52bd556d1eddcbb183554f1c9bb3803d42070f656042f4513dcf

    • SHA512

      b130b2cbd99e249e9c74c660b2c4ac99accb6892de6bf9aea257473cd01d0465db9c1be650c01dca678fea4900fdc433f419577362de2f56255b1d61ca08c173

    • SSDEEP

      196608:ZL0AtVPV9JWwIPfL5Vc03FGPDuqxg5EHBktj:RbJEH/cdPDuqysBktj

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks