General

  • Target

    PourUP_FN.exe

  • Size

    5.1MB

  • Sample

    221218-31jwmagh7t

  • MD5

    71b34d0a9d79207cf575e6ea8611dbb5

  • SHA1

    837c8a8e57ce91a366431dbb0e3393577659c060

  • SHA256

    25cc2c215100cf171977ad78e9875ddeda107eee38e3043ef135d833cccba6f0

  • SHA512

    154b0fef843b08dc4d8c5f06a2b9223316dd6079c53da980c055afd99ff424053fed8d6fc5471cfd3400584f11feb83e94b3a669d95df48fd967f5cce2b9115b

  • SSDEEP

    98304:G+d/S4SF29wP3cIwmcWK3hCIMlu8bb08qngKR88304+r2k6TCxQEANqQG:G6/S422VJWKJMYX8qgBgl+yk6rNqQ

Malware Config

Targets

    • Target

      PourUP_FN.exe

    • Size

      5.1MB

    • MD5

      71b34d0a9d79207cf575e6ea8611dbb5

    • SHA1

      837c8a8e57ce91a366431dbb0e3393577659c060

    • SHA256

      25cc2c215100cf171977ad78e9875ddeda107eee38e3043ef135d833cccba6f0

    • SHA512

      154b0fef843b08dc4d8c5f06a2b9223316dd6079c53da980c055afd99ff424053fed8d6fc5471cfd3400584f11feb83e94b3a669d95df48fd967f5cce2b9115b

    • SSDEEP

      98304:G+d/S4SF29wP3cIwmcWK3hCIMlu8bb08qngKR88304+r2k6TCxQEANqQG:G6/S422VJWKJMYX8qgBgl+yk6rNqQ

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets service image path in registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks