General

  • Target

    754d764d71e3a59739d454c268f68fcab6ec3b95e6aa15de46f31dfee9a6f4a9

  • Size

    3.4MB

  • Sample

    230323-ybat7sbf9v

  • MD5

    328c53fc62c8bd7ba812e0be7b7e2c3e

  • SHA1

    f3b72b25f0cf4e25360d7b9a20388e6c9cb79c3a

  • SHA256

    754d764d71e3a59739d454c268f68fcab6ec3b95e6aa15de46f31dfee9a6f4a9

  • SHA512

    53d6bcc238a22ae463365ebde0fe550187846bf82250b2c1298f692510bf709c87ddbaed9423eeb514035facc94cffb0fd1e6a1d200efd947d9965b231fabde8

  • SSDEEP

    98304:oST9w80soegcII9U+lVAkWi4D7BDE4Nmmwe:oST9wO1u+lkBQumY

Malware Config

Targets

    • Target

      754d764d71e3a59739d454c268f68fcab6ec3b95e6aa15de46f31dfee9a6f4a9

    • Size

      3.4MB

    • MD5

      328c53fc62c8bd7ba812e0be7b7e2c3e

    • SHA1

      f3b72b25f0cf4e25360d7b9a20388e6c9cb79c3a

    • SHA256

      754d764d71e3a59739d454c268f68fcab6ec3b95e6aa15de46f31dfee9a6f4a9

    • SHA512

      53d6bcc238a22ae463365ebde0fe550187846bf82250b2c1298f692510bf709c87ddbaed9423eeb514035facc94cffb0fd1e6a1d200efd947d9965b231fabde8

    • SSDEEP

      98304:oST9w80soegcII9U+lVAkWi4D7BDE4Nmmwe:oST9wO1u+lkBQumY

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks