General

  • Target

    c61ff3664d37a73fb7079f271f8e32abba6c1878e59f83dea17679c3787a6df5

  • Size

    3.4MB

  • Sample

    230325-w4y2dsdh67

  • MD5

    132c05ac65c52d5135dca2dc3455fae3

  • SHA1

    d70d901903e569ca834f1f2cdc0c1b71b55bb578

  • SHA256

    c61ff3664d37a73fb7079f271f8e32abba6c1878e59f83dea17679c3787a6df5

  • SHA512

    bf1ade1a793f4d874e2f6a2a297df73691e61ff610d11c092400706ac2560d5ca50c5b5bf890031c79c4604199d8c29a426a0d664e41c4021527cfc3b193a2e4

  • SSDEEP

    98304:WP7rRFqvcFQyFci7kamVGCpv+E0EK+BVC:6nqvgQyFHmVGCb

Malware Config

Targets

    • Target

      c61ff3664d37a73fb7079f271f8e32abba6c1878e59f83dea17679c3787a6df5

    • Size

      3.4MB

    • MD5

      132c05ac65c52d5135dca2dc3455fae3

    • SHA1

      d70d901903e569ca834f1f2cdc0c1b71b55bb578

    • SHA256

      c61ff3664d37a73fb7079f271f8e32abba6c1878e59f83dea17679c3787a6df5

    • SHA512

      bf1ade1a793f4d874e2f6a2a297df73691e61ff610d11c092400706ac2560d5ca50c5b5bf890031c79c4604199d8c29a426a0d664e41c4021527cfc3b193a2e4

    • SSDEEP

      98304:WP7rRFqvcFQyFci7kamVGCpv+E0EK+BVC:6nqvgQyFHmVGCb

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks