General

  • Target

    phpini.exe

  • Size

    4.7MB

  • Sample

    230307-v4vhjaba73

  • MD5

    f2da40fe18e3f03352142579ebe11d38

  • SHA1

    54629e222de3777d9e96bcc2fb220fd22f2bf6f0

  • SHA256

    7eb52ff9eb4f8e25d2d5fb2ad72c65141b260a6961f2a6b77c51e354cee4c58f

  • SHA512

    d6e353bcc30a44a1fca2dccd75b09756d44ff19fcc41a700e3b42de20fea302ef0b5a9cc85841ca5896591cd67bc51cb8e83f4edce683647258894dc965fbdad

  • SSDEEP

    49152:fJW/K8rUGrf8PwTJdhdCc3mUL5++gcegfIWrf/o1ew/7WG1pxd0XGhY1S2F0U4PP:YK4U2fLJdrCc3mB+gnVkWjqp4rAPG

Malware Config

Targets

    • Target

      phpini.exe

    • Size

      4.7MB

    • MD5

      f2da40fe18e3f03352142579ebe11d38

    • SHA1

      54629e222de3777d9e96bcc2fb220fd22f2bf6f0

    • SHA256

      7eb52ff9eb4f8e25d2d5fb2ad72c65141b260a6961f2a6b77c51e354cee4c58f

    • SHA512

      d6e353bcc30a44a1fca2dccd75b09756d44ff19fcc41a700e3b42de20fea302ef0b5a9cc85841ca5896591cd67bc51cb8e83f4edce683647258894dc965fbdad

    • SSDEEP

      49152:fJW/K8rUGrf8PwTJdhdCc3mUL5++gcegfIWrf/o1ew/7WG1pxd0XGhY1S2F0U4PP:YK4U2fLJdrCc3mB+gnVkWjqp4rAPG

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks