General

  • Target

    b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6

  • Size

    3.4MB

  • Sample

    230327-17g99sfe98

  • MD5

    23f11a7d3c4598a480da9dffa64c07d7

  • SHA1

    49c861957c9d335afa9775195f8eea0242c6039b

  • SHA256

    b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6

  • SHA512

    e8f765e74e71d72a7b7b26dbf4b105556df5deab62caa0e7c621c0353ffe1e75ba4fb5bea5a1ef8c29a4dd5c9d48a86847f3178390b44ff9c2d98768e2c52eb1

  • SSDEEP

    98304:BJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:B8D/yIqlhlW4i/QsnwZzjMSeVq

Malware Config

Targets

    • Target

      b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6

    • Size

      3.4MB

    • MD5

      23f11a7d3c4598a480da9dffa64c07d7

    • SHA1

      49c861957c9d335afa9775195f8eea0242c6039b

    • SHA256

      b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6

    • SHA512

      e8f765e74e71d72a7b7b26dbf4b105556df5deab62caa0e7c621c0353ffe1e75ba4fb5bea5a1ef8c29a4dd5c9d48a86847f3178390b44ff9c2d98768e2c52eb1

    • SSDEEP

      98304:BJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:B8D/yIqlhlW4i/QsnwZzjMSeVq

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks