General

  • Target

    ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.zip

  • Size

    3.3MB

  • Sample

    230321-rz2t9sdc8w

  • MD5

    7682a71761d242ca2ea5b1a0909ee134

  • SHA1

    61428a3635a9f64b5f48b56f9d19435069722e22

  • SHA256

    840bfabcd932831d640bb2dbe6605d38e825a17d070fdb40cf85d2c7c8575732

  • SHA512

    4770188fa1586816c5639160b8c7a9e9064dd0be3a433639af94241b4ef3df4c37616c3a54f4223633cd77a9e6b4d50cd796448b92b258a65fe9b9b65bdb4457

  • SSDEEP

    98304:HfYzn+fZEICTPAt+ye7hOqlocev6YOsM/CLZ5oyft5CIVV:Hwz2ZEICPVye7EqlwvTOsM5yV/V

Malware Config

Targets

    • Target

      ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe

    • Size

      3.4MB

    • MD5

      588cd06833601b361f843c87056fd5a9

    • SHA1

      36fd19550588e46b7ae12639421e9768f6172f0a

    • SHA256

      ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1

    • SHA512

      74ca11d07f98dcbae852fb94fd3fa5fb641a73917c6e85b1e2e0f49c5e8f604a14ea3deaf146ce23d4814f3daf2082d3c90d72d2759507d51cf45284f50fc979

    • SSDEEP

      98304:cPMHpHh81TVkOjPdBx425wr7MARYza/PnrHT86b4GGsVJxz:cUrkTiOjPn76hCa/PrHlrVJxz

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks