General

  • Target

    FuckMeDaddy.exe

  • Size

    4.2MB

  • Sample

    230323-mvz3nafb29

  • MD5

    220ff1ba3a62c1196e59b73315ce2cce

  • SHA1

    60a0e81e130f519f87fef859c0f69fec338e30d6

  • SHA256

    7edb45e51d05406adac04d2b0f00426b5f072127629a463084e4c105291620d4

  • SHA512

    1bafa76c9d4e5d744d47e5128b7ffa9dd4696481ee5a4dafa031e6654517617d4e61c9df987123005f78b0e4d314c060354dd00d2c526c8a69f068d4bbabea12

  • SSDEEP

    98304:cVZAL6CpWiZVYvyLM2Fu13UtPTF2iGdrS+GSed:iZAWqZ7LM2FulUybhSZt

Malware Config

Targets

    • Target

      FuckMeDaddy.exe

    • Size

      4.2MB

    • MD5

      220ff1ba3a62c1196e59b73315ce2cce

    • SHA1

      60a0e81e130f519f87fef859c0f69fec338e30d6

    • SHA256

      7edb45e51d05406adac04d2b0f00426b5f072127629a463084e4c105291620d4

    • SHA512

      1bafa76c9d4e5d744d47e5128b7ffa9dd4696481ee5a4dafa031e6654517617d4e61c9df987123005f78b0e4d314c060354dd00d2c526c8a69f068d4bbabea12

    • SSDEEP

      98304:cVZAL6CpWiZVYvyLM2Fu13UtPTF2iGdrS+GSed:iZAWqZ7LM2FulUybhSZt

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks