General

  • Target

    Wondershare FilmoraX.exe

  • Size

    318.3MB

  • Sample

    230110-rz1xzagd46

  • MD5

    e887c044ef735fead2ff8d9b604074c4

  • SHA1

    b6a37bd7cd923be728f050e86dfd2d11c6a84271

  • SHA256

    ecb4692fda4d9980ac122555676602dcb21cd947612261cd92446ee2fbf276b5

  • SHA512

    96e92e94a9c274c2b44d4ef9e8ccbc71210949ee21e840aeecf143b7046dd982e0d1b229c971ddc9091fe5db9fa39bb280842ab34a0e93485e9829b7a4a45ae2

  • SSDEEP

    6291456:M0HDFB3dVrGOJQeIbUTxC3KWgmTdudk6mqAtsiw1DLMkKmibYVGRiQJ:McCQqUT43tTdudtmr9w5omi0GPJ

Malware Config

Targets

    • Target

      Wondershare FilmoraX.exe

    • Size

      318.3MB

    • MD5

      e887c044ef735fead2ff8d9b604074c4

    • SHA1

      b6a37bd7cd923be728f050e86dfd2d11c6a84271

    • SHA256

      ecb4692fda4d9980ac122555676602dcb21cd947612261cd92446ee2fbf276b5

    • SHA512

      96e92e94a9c274c2b44d4ef9e8ccbc71210949ee21e840aeecf143b7046dd982e0d1b229c971ddc9091fe5db9fa39bb280842ab34a0e93485e9829b7a4a45ae2

    • SSDEEP

      6291456:M0HDFB3dVrGOJQeIbUTxC3KWgmTdudk6mqAtsiw1DLMkKmibYVGRiQJ:McCQqUT43tTdudtmr9w5omi0GPJ

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks