General

  • Target

    445a3a155b6d4e73e2bb2662c28bfb29093563b90d8322cf459838f88b404102

  • Size

    3.4MB

  • Sample

    230313-arrwnaaa4y

  • MD5

    fda332fda773ed70ebbe56f806257e2f

  • SHA1

    249a3fcdd4fabb5e1dd420cc514d219be83768d7

  • SHA256

    445a3a155b6d4e73e2bb2662c28bfb29093563b90d8322cf459838f88b404102

  • SHA512

    0e1b617f65aab724fc27436157648ce17c799ffa6e6da0525f85c0599625c15cbb49280074d37f40a65a4ced44a89c389038acbd35ce16bd0faae68f05bf1827

  • SSDEEP

    98304:jlaEU6/HWQ4noYOCtapQX9ejqcT3/SgYf:jwEH/QotQGrT3K

Malware Config

Targets

    • Target

      445a3a155b6d4e73e2bb2662c28bfb29093563b90d8322cf459838f88b404102

    • Size

      3.4MB

    • MD5

      fda332fda773ed70ebbe56f806257e2f

    • SHA1

      249a3fcdd4fabb5e1dd420cc514d219be83768d7

    • SHA256

      445a3a155b6d4e73e2bb2662c28bfb29093563b90d8322cf459838f88b404102

    • SHA512

      0e1b617f65aab724fc27436157648ce17c799ffa6e6da0525f85c0599625c15cbb49280074d37f40a65a4ced44a89c389038acbd35ce16bd0faae68f05bf1827

    • SSDEEP

      98304:jlaEU6/HWQ4noYOCtapQX9ejqcT3/SgYf:jwEH/QotQGrT3K

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks