General

  • Target

    37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec

  • Size

    3.4MB

  • Sample

    230319-17r5gacd9t

  • MD5

    d9ec59dc2b480fd37139f08cce7fed33

  • SHA1

    25e896392964466e54159e5b9678cf69c134aa24

  • SHA256

    37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec

  • SHA512

    222842ff347e0572cd81770a207c6400d27d56c03335e2f1ba963af25bca58ecdec690b599f871c2a2e8d7699fb28e7d8aaeca3c576d8dcde57396732f9eaa04

  • SSDEEP

    49152:Jr1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlo5:CKvfd94XayMT5sH9M0aS8o9uWyUhHyY

Malware Config

Targets

    • Target

      37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec

    • Size

      3.4MB

    • MD5

      d9ec59dc2b480fd37139f08cce7fed33

    • SHA1

      25e896392964466e54159e5b9678cf69c134aa24

    • SHA256

      37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec

    • SHA512

      222842ff347e0572cd81770a207c6400d27d56c03335e2f1ba963af25bca58ecdec690b599f871c2a2e8d7699fb28e7d8aaeca3c576d8dcde57396732f9eaa04

    • SSDEEP

      49152:Jr1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlo5:CKvfd94XayMT5sH9M0aS8o9uWyUhHyY

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks