General

  • Target

    4dd3929d084404437c61142c4cf4dae54e8966033bf025eabc40cea0693f7e15

  • Size

    3.4MB

  • Sample

    230319-b9f3jsge3y

  • MD5

    d8b1b3d68b82ab27f313066126d8c8ad

  • SHA1

    bc8f3ad71bf94e0053578010aead94894b7fdb40

  • SHA256

    4dd3929d084404437c61142c4cf4dae54e8966033bf025eabc40cea0693f7e15

  • SHA512

    7662a949e18bc7987267fe282733604b3f037b44d3fec9df7d6564ce173ec9d50eb78df01f50586a7d16c5c561ce2b71a13adccf4e8a537191ce16d3589962e5

  • SSDEEP

    49152:Ir1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlol:jKvfd94XayMT5sH9M0aS8o9uWyUhHyc

Malware Config

Targets

    • Target

      4dd3929d084404437c61142c4cf4dae54e8966033bf025eabc40cea0693f7e15

    • Size

      3.4MB

    • MD5

      d8b1b3d68b82ab27f313066126d8c8ad

    • SHA1

      bc8f3ad71bf94e0053578010aead94894b7fdb40

    • SHA256

      4dd3929d084404437c61142c4cf4dae54e8966033bf025eabc40cea0693f7e15

    • SHA512

      7662a949e18bc7987267fe282733604b3f037b44d3fec9df7d6564ce173ec9d50eb78df01f50586a7d16c5c561ce2b71a13adccf4e8a537191ce16d3589962e5

    • SSDEEP

      49152:Ir1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlol:jKvfd94XayMT5sH9M0aS8o9uWyUhHyc

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks