General

  • Target

    f12be82e785b6c75243ded83828b3b317812b3f9a81f86b43479d108b7f2c807

  • Size

    3.4MB

  • Sample

    230319-gzg5rahc61

  • MD5

    b37a7f6870eff5c5377dcb031326fac0

  • SHA1

    c88b59b33214adb109179f8885a4e7860a0e088a

  • SHA256

    f12be82e785b6c75243ded83828b3b317812b3f9a81f86b43479d108b7f2c807

  • SHA512

    1bdae0148e75e56d6227808775be7470545ea9300e5db6bdbb0616b88860b708673d37fa8f094efe11b01b902cd4863fe7ad8c7f17ad1d7a81128c05c0e129a8

  • SSDEEP

    49152:hr1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVloX:qKvfd94XayMT5sH9M0aS8o9uWyUhHyC

Malware Config

Targets

    • Target

      f12be82e785b6c75243ded83828b3b317812b3f9a81f86b43479d108b7f2c807

    • Size

      3.4MB

    • MD5

      b37a7f6870eff5c5377dcb031326fac0

    • SHA1

      c88b59b33214adb109179f8885a4e7860a0e088a

    • SHA256

      f12be82e785b6c75243ded83828b3b317812b3f9a81f86b43479d108b7f2c807

    • SHA512

      1bdae0148e75e56d6227808775be7470545ea9300e5db6bdbb0616b88860b708673d37fa8f094efe11b01b902cd4863fe7ad8c7f17ad1d7a81128c05c0e129a8

    • SSDEEP

      49152:hr1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVloX:qKvfd94XayMT5sH9M0aS8o9uWyUhHyC

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks