General

  • Target

    33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0

  • Size

    3.4MB

  • Sample

    230317-17c1jscc4s

  • MD5

    41b8532d997713259f828693c247e2f6

  • SHA1

    91ad435234c77841bdd2df3879752e4d0340d093

  • SHA256

    33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0

  • SHA512

    65a50595b57de8a6b79796ed4bfed86abfb6dabf84f830e25a4e40cf3c7f4ab663bfd079b7665a671b0594b9b17ec5d5a2bbd3367cd8f317887b00c1d63c8050

  • SSDEEP

    98304:7aD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzF7:vt4rqN19ne

Malware Config

Targets

    • Target

      33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0

    • Size

      3.4MB

    • MD5

      41b8532d997713259f828693c247e2f6

    • SHA1

      91ad435234c77841bdd2df3879752e4d0340d093

    • SHA256

      33745b0b347bcf79ef1f3aa234b939e9cb0d0171cd20c7073b1a7317350f75a0

    • SHA512

      65a50595b57de8a6b79796ed4bfed86abfb6dabf84f830e25a4e40cf3c7f4ab663bfd079b7665a671b0594b9b17ec5d5a2bbd3367cd8f317887b00c1d63c8050

    • SSDEEP

      98304:7aD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzF7:vt4rqN19ne

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks