General

  • Target

    383edea294d912ee23177818f8b5e55e2714c2c5b6fc8ecbe546c7f1a513d585

  • Size

    3.4MB

  • Sample

    230315-3j2p4sab91

  • MD5

    caa09c0f2ef7475871bdbec6139d7db3

  • SHA1

    fe5e5aae9a99d9584b4e5281af792860561668b3

  • SHA256

    383edea294d912ee23177818f8b5e55e2714c2c5b6fc8ecbe546c7f1a513d585

  • SHA512

    b722e4d7a91ba653962059158ed086e5eac21bfd18ae688e3d5147983929b1a013643ff1b0ef80925b9f47b68ead4f836867bcd0095a55c639566e32abb7aa02

  • SSDEEP

    98304:r+na5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPYz:Ua5InxsjmTK+gQIjCwi

Malware Config

Targets

    • Target

      383edea294d912ee23177818f8b5e55e2714c2c5b6fc8ecbe546c7f1a513d585

    • Size

      3.4MB

    • MD5

      caa09c0f2ef7475871bdbec6139d7db3

    • SHA1

      fe5e5aae9a99d9584b4e5281af792860561668b3

    • SHA256

      383edea294d912ee23177818f8b5e55e2714c2c5b6fc8ecbe546c7f1a513d585

    • SHA512

      b722e4d7a91ba653962059158ed086e5eac21bfd18ae688e3d5147983929b1a013643ff1b0ef80925b9f47b68ead4f836867bcd0095a55c639566e32abb7aa02

    • SSDEEP

      98304:r+na5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPYz:Ua5InxsjmTK+gQIjCwi

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks