General

  • Target

    BruteL4 DDOS Tool.exe

  • Size

    12.0MB

  • Sample

    230325-rdsdpsfb3s

  • MD5

    7469696e71e96dd67ce6c5f59c2e77c7

  • SHA1

    a26de444a133d56eb51f5bac21fb2f925b5ee37a

  • SHA256

    55c2faf7a200fe2db176dd0a7c43bd8f97d4a485814d6b105855ae7adfadcb32

  • SHA512

    7702b5c08999a52816ff0176efe14f7d3c3808081337077f4fd4154cd29d3641aca5508d37c10e44d1980f835c868e9f2d3c71fda23f89c9ff80ca0f238f4c4c

  • SSDEEP

    393216:J+aZeyhEOh8pJpdEYTzuaj5DDKEeuuODGfTc:MahEe8pVEY3uaJWEhuODGw

Malware Config

Targets

    • Target

      BruteL4 DDOS Tool.exe

    • Size

      12.0MB

    • MD5

      7469696e71e96dd67ce6c5f59c2e77c7

    • SHA1

      a26de444a133d56eb51f5bac21fb2f925b5ee37a

    • SHA256

      55c2faf7a200fe2db176dd0a7c43bd8f97d4a485814d6b105855ae7adfadcb32

    • SHA512

      7702b5c08999a52816ff0176efe14f7d3c3808081337077f4fd4154cd29d3641aca5508d37c10e44d1980f835c868e9f2d3c71fda23f89c9ff80ca0f238f4c4c

    • SSDEEP

      393216:J+aZeyhEOh8pJpdEYTzuaj5DDKEeuuODGfTc:MahEe8pVEY3uaJWEhuODGw

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks