General

  • Target

    c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45

  • Size

    3.4MB

  • Sample

    230317-17ppcaab88

  • MD5

    b89cfb2403ff3c814ddd79624874e213

  • SHA1

    d107ad1b15cde70754142f591a5581d3b28ef356

  • SHA256

    c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45

  • SHA512

    5b3e7554d219ffae18daeaa03d654ba20be26f19092616aef19b48074376834f0a2369a9d05ed338c9b9fa4027226bec3c3b58a9c05c15185e14e1136ae2c571

  • SSDEEP

    98304:UbaD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzFm:0t4rqN19n/

Malware Config

Targets

    • Target

      c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45

    • Size

      3.4MB

    • MD5

      b89cfb2403ff3c814ddd79624874e213

    • SHA1

      d107ad1b15cde70754142f591a5581d3b28ef356

    • SHA256

      c1f9375f5df21b182cbe9c882cc263cbb8b991c79c85016c2ce34f4cacf69f45

    • SHA512

      5b3e7554d219ffae18daeaa03d654ba20be26f19092616aef19b48074376834f0a2369a9d05ed338c9b9fa4027226bec3c3b58a9c05c15185e14e1136ae2c571

    • SSDEEP

      98304:UbaD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzFm:0t4rqN19n/

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks