General

  • Target

    MOL.EXE.exe

  • Size

    3.4MB

  • Sample

    230321-erdfgsag2y

  • MD5

    588cd06833601b361f843c87056fd5a9

  • SHA1

    36fd19550588e46b7ae12639421e9768f6172f0a

  • SHA256

    ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1

  • SHA512

    74ca11d07f98dcbae852fb94fd3fa5fb641a73917c6e85b1e2e0f49c5e8f604a14ea3deaf146ce23d4814f3daf2082d3c90d72d2759507d51cf45284f50fc979

  • SSDEEP

    98304:cPMHpHh81TVkOjPdBx425wr7MARYza/PnrHT86b4GGsVJxz:cUrkTiOjPn76hCa/PrHlrVJxz

Malware Config

Targets

    • Target

      MOL.EXE.exe

    • Size

      3.4MB

    • MD5

      588cd06833601b361f843c87056fd5a9

    • SHA1

      36fd19550588e46b7ae12639421e9768f6172f0a

    • SHA256

      ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1

    • SHA512

      74ca11d07f98dcbae852fb94fd3fa5fb641a73917c6e85b1e2e0f49c5e8f604a14ea3deaf146ce23d4814f3daf2082d3c90d72d2759507d51cf45284f50fc979

    • SSDEEP

      98304:cPMHpHh81TVkOjPdBx425wr7MARYza/PnrHT86b4GGsVJxz:cUrkTiOjPn76hCa/PrHlrVJxz

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks