General

  • Target

    16de2d117ecc69105a0aeba86af11edc275406e97ac37af0de2ef97fd3882b45

  • Size

    3.4MB

  • Sample

    230321-kyw43abd4z

  • MD5

    162933d2c07d9ab6f2c8ca9d0cdf8af6

  • SHA1

    0eda3232e88b936e166cd06ab6f2c6f703e86728

  • SHA256

    16de2d117ecc69105a0aeba86af11edc275406e97ac37af0de2ef97fd3882b45

  • SHA512

    81a321f6e3e63e8ae8ea83121ffb19ce161805370c8fbe86b526a2726dcbbb31545cb6dc14f1827a8b3cdd3fd26f4b9072624e1b385eb546d035c1dc434ef4b6

  • SSDEEP

    98304:+B/hPovhl+YHt0DJSZtAzc/K9gMus7RfRwUIq8DuznQ6:+zQm6EJzxl7RJwk8DuznQ6

Malware Config

Targets

    • Target

      16de2d117ecc69105a0aeba86af11edc275406e97ac37af0de2ef97fd3882b45

    • Size

      3.4MB

    • MD5

      162933d2c07d9ab6f2c8ca9d0cdf8af6

    • SHA1

      0eda3232e88b936e166cd06ab6f2c6f703e86728

    • SHA256

      16de2d117ecc69105a0aeba86af11edc275406e97ac37af0de2ef97fd3882b45

    • SHA512

      81a321f6e3e63e8ae8ea83121ffb19ce161805370c8fbe86b526a2726dcbbb31545cb6dc14f1827a8b3cdd3fd26f4b9072624e1b385eb546d035c1dc434ef4b6

    • SSDEEP

      98304:+B/hPovhl+YHt0DJSZtAzc/K9gMus7RfRwUIq8DuznQ6:+zQm6EJzxl7RJwk8DuznQ6

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks