General

  • Target

    tmp

  • Size

    3.7MB

  • Sample

    230112-n6cbeabf5v

  • MD5

    92869e94c71833c72b431746f234df5d

  • SHA1

    ba100de55cb7b04a6e39e391942b28a31bd3bd00

  • SHA256

    67cfdfdb26f8a2ad408fa8e56b8871bbf4657657ef0c263856edaf129378df18

  • SHA512

    12add3273ca7e14763f46f90b94c90f7be524d117b657784b6a87f928615a251193de1401be42bdd06c4af3192ce270d8ec766aaf9cbc9e9733e2c371d059f80

  • SSDEEP

    98304:1C6bC1J7itJ72IsqMjUB/ynP24vUvO1ReneFnZ2+n+WOYtGQk:xkAKPRgo9cQk

Malware Config

Targets

    • Target

      tmp

    • Size

      3.7MB

    • MD5

      92869e94c71833c72b431746f234df5d

    • SHA1

      ba100de55cb7b04a6e39e391942b28a31bd3bd00

    • SHA256

      67cfdfdb26f8a2ad408fa8e56b8871bbf4657657ef0c263856edaf129378df18

    • SHA512

      12add3273ca7e14763f46f90b94c90f7be524d117b657784b6a87f928615a251193de1401be42bdd06c4af3192ce270d8ec766aaf9cbc9e9733e2c371d059f80

    • SSDEEP

      98304:1C6bC1J7itJ72IsqMjUB/ynP24vUvO1ReneFnZ2+n+WOYtGQk:xkAKPRgo9cQk

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks