General

  • Target

    Setup.zip

  • Size

    10.3MB

  • Sample

    230106-mlc7jabd6v

  • MD5

    fa185a66eed084670cf9b571d10337e9

  • SHA1

    0c429b8043552187b2cce753ea14772ecc64f148

  • SHA256

    9a51ecde817d4a731a11a202f93076ffca9adf9bbde10138b1a46a1690add11c

  • SHA512

    319e9a354bba6bac43f3d5533648c88e1fc0a7095ad4ea3704bd9f2e092fe7b771de58c6387c5bb5595b1537fc0cdf83501df59772ec75a18b7006fdd923ae6e

  • SSDEEP

    196608:5vD7p56QCJNzd3LqD4Tkcq2bjppL2qhGI5tS1qQy/NsyMfvmZY:5vD7PnMNzBqDCjppL2qxtT+ytY

Malware Config

Targets

    • Target

      Setup.exe

    • Size

      358.2MB

    • MD5

      aa2152760ef244611379b8e449f5b998

    • SHA1

      b3c11e7420f3e0ba1a0d84d575dc3154410cc805

    • SHA256

      0b1947e86f51a393cacb9e7d35f03b1fa0a3d7242328924441bcc70d5c5edac7

    • SHA512

      cfcfe05c4a3b56746567f1f613313d1a3f409421fab00e56750f166f9848ef44bc9a99cd1486783a1835dcc83a3b69bfcbba878b0c61cee8e4abf77b94720fd5

    • SSDEEP

      98304:uSk6F51U6HNesMycfbbEHv0mrSCcBT7h58oql8V6QYOaBBQY:LkiXRN8KS8oqlXB+

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks