General

  • Target

    ce356989f72b5d117d8e41b2020b6f71ff264c10b114ebfe3e0e7c61a0c87013

  • Size

    3.4MB

  • Sample

    230313-w7htksdf5y

  • MD5

    fcd74e04f380e115f9c2f9ac3645d376

  • SHA1

    f7ede6125026f0fab4c520c4234dcbfaa7cc6d89

  • SHA256

    ce356989f72b5d117d8e41b2020b6f71ff264c10b114ebfe3e0e7c61a0c87013

  • SHA512

    842a998f194c299f98b096c842e001d88cdbdcbf6d7d363366721b54443586c847c88f0f8cf6dac63c81dcc8315a10ea6192335515b04e5eae4d386e999c06b5

  • SSDEEP

    98304:tSCmwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:8CmRhfv3DG4+vsXjcM0zv8jS

Malware Config

Targets

    • Target

      ce356989f72b5d117d8e41b2020b6f71ff264c10b114ebfe3e0e7c61a0c87013

    • Size

      3.4MB

    • MD5

      fcd74e04f380e115f9c2f9ac3645d376

    • SHA1

      f7ede6125026f0fab4c520c4234dcbfaa7cc6d89

    • SHA256

      ce356989f72b5d117d8e41b2020b6f71ff264c10b114ebfe3e0e7c61a0c87013

    • SHA512

      842a998f194c299f98b096c842e001d88cdbdcbf6d7d363366721b54443586c847c88f0f8cf6dac63c81dcc8315a10ea6192335515b04e5eae4d386e999c06b5

    • SSDEEP

      98304:tSCmwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:8CmRhfv3DG4+vsXjcM0zv8jS

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks