General

  • Target

    559343650622dff6f46762a32ff54c03ac8296f700d8914812440af4c9e0a5c0

  • Size

    3.4MB

  • Sample

    230319-cx2ddsee68

  • MD5

    190a6ae730a81c5a672e2d8498e230ff

  • SHA1

    1e2457b2a56aafd15424a420813a13f52cda6287

  • SHA256

    559343650622dff6f46762a32ff54c03ac8296f700d8914812440af4c9e0a5c0

  • SHA512

    946e6b2793e8fa8fb57b16f889b8ba2bf9b8a48d5c2fedd0806db81086d59ff7fd5bce67a623e715329263569b3757442aba49d614a1954cdc998cbc68ea50ec

  • SSDEEP

    49152:7r1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVloF:QKvfd94XayMT5sH9M0aS8o9uWyUhHy0

Malware Config

Targets

    • Target

      559343650622dff6f46762a32ff54c03ac8296f700d8914812440af4c9e0a5c0

    • Size

      3.4MB

    • MD5

      190a6ae730a81c5a672e2d8498e230ff

    • SHA1

      1e2457b2a56aafd15424a420813a13f52cda6287

    • SHA256

      559343650622dff6f46762a32ff54c03ac8296f700d8914812440af4c9e0a5c0

    • SHA512

      946e6b2793e8fa8fb57b16f889b8ba2bf9b8a48d5c2fedd0806db81086d59ff7fd5bce67a623e715329263569b3757442aba49d614a1954cdc998cbc68ea50ec

    • SSDEEP

      49152:7r1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVloF:QKvfd94XayMT5sH9M0aS8o9uWyUhHy0

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks