General

  • Target

    95e329e0d4d5410f110c760803bfb1f74ab209f1dfb5823b0c76ada85efecd20

  • Size

    3.4MB

  • Sample

    230318-fe24radc7v

  • MD5

    a36a608fb10885bfa053508758a3fbcb

  • SHA1

    562c20cf30d91620a6c2874b7fe80a7fef6630c0

  • SHA256

    95e329e0d4d5410f110c760803bfb1f74ab209f1dfb5823b0c76ada85efecd20

  • SHA512

    55dc7a89505690f8a07a3b7a7bb99e99337b9387bfcbcad0d41dcee5da2d814c601af4cdf350fa372b251f7e5e1587baa6cb56910de7382cf60bf4bb0f0a663d

  • SSDEEP

    98304:F6aD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzFN:Ut4rqN19nY

Malware Config

Targets

    • Target

      95e329e0d4d5410f110c760803bfb1f74ab209f1dfb5823b0c76ada85efecd20

    • Size

      3.4MB

    • MD5

      a36a608fb10885bfa053508758a3fbcb

    • SHA1

      562c20cf30d91620a6c2874b7fe80a7fef6630c0

    • SHA256

      95e329e0d4d5410f110c760803bfb1f74ab209f1dfb5823b0c76ada85efecd20

    • SHA512

      55dc7a89505690f8a07a3b7a7bb99e99337b9387bfcbcad0d41dcee5da2d814c601af4cdf350fa372b251f7e5e1587baa6cb56910de7382cf60bf4bb0f0a663d

    • SSDEEP

      98304:F6aD2xzt49ndR/hqOAX7Jhh15VRN6UnNOzFN:Ut4rqN19nY

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks