General

  • Target

    YS_External_V2.exe

  • Size

    23.7MB

  • Sample

    230325-v3y5bsfg6v

  • MD5

    a55deccd022c6cf5a67bd3138a0a6d69

  • SHA1

    cef90145fa44b969af6ec76b7ac650e778e5c953

  • SHA256

    914d9b43d9d945fe5c372487ffa692b6d1d68e64945a726b2c35699c31af661e

  • SHA512

    b797d8ab14c3acc232d243c5a7bd0958929d93c4ba96b4dd68f3167c5b8753c63a874b1a6f0cdcd7f43dcb250958e0572b23ceee6b6e36a1fb1a011fb2e5ada6

  • SSDEEP

    393216:Mm9FpgMIfmAL0Fnch/d9WOBkUS9RBnuBRhfvSoWchi3x1Bn:D97gb0dcd9jkLT8BjYc2N

Malware Config

Targets

    • Target

      YS_External_V2.exe

    • Size

      23.7MB

    • MD5

      a55deccd022c6cf5a67bd3138a0a6d69

    • SHA1

      cef90145fa44b969af6ec76b7ac650e778e5c953

    • SHA256

      914d9b43d9d945fe5c372487ffa692b6d1d68e64945a726b2c35699c31af661e

    • SHA512

      b797d8ab14c3acc232d243c5a7bd0958929d93c4ba96b4dd68f3167c5b8753c63a874b1a6f0cdcd7f43dcb250958e0572b23ceee6b6e36a1fb1a011fb2e5ada6

    • SSDEEP

      393216:Mm9FpgMIfmAL0Fnch/d9WOBkUS9RBnuBRhfvSoWchi3x1Bn:D97gb0dcd9jkLT8BjYc2N

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks