General

  • Target

    c5d71dbbbc50db8c2762835e83e0bd9c.bin

  • Size

    5.5MB

  • Sample

    230322-b9z6esgc4v

  • MD5

    fbea03e1a8991725175f278da43b2b50

  • SHA1

    bdaca2ec885ee4614651ed322f553331cbe2d5bb

  • SHA256

    edabdd4619e3178ddca7420c7fae51ee49c9374b67eaf7ad34750f9bec70730e

  • SHA512

    020fb777980b98f60fef5decfa0206f7ca1558e9d505ed0d40466f73cb180507db4cd45c83305894a56573529f1dcff515266985dbaeed3c10237078cb24cd87

  • SSDEEP

    98304:uNu35b+Ao1pzdtGSAayt7QFZiT5agOVpNmAnDZcr6Zzs8nuITJ9rck7icD3imlE0:wu35m1pzdMDatULGNDZcr61slIl9rtW2

Malware Config

Targets

    • Target

      449adac1f0940043f26ab1a8b91748360b4d7d9759108d3db6669edd758129cb.exe

    • Size

      5.6MB

    • MD5

      c5d71dbbbc50db8c2762835e83e0bd9c

    • SHA1

      e266d9870fcf13d7072e9e7a6a881a239ac0c523

    • SHA256

      449adac1f0940043f26ab1a8b91748360b4d7d9759108d3db6669edd758129cb

    • SHA512

      4ff07f801849131e621f7fa605c4215f3bd1c4229e1de99b23f3fc7c07c0a798935cb590fa9ea0b9fee1422f771198bbb84a58ad128743e7e90580fb29304bdc

    • SSDEEP

      98304:H7nk+M3jECnNQJkMn33Mbz0Hy5SF+EaIFKedyFY1+EgYO6wLujDo8E+7LtJqfjXC:YLzhMCpQ+1edyePg969JTEX6NZ

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks