General

  • Target

    cfb48165cf0c4c1226865468ea9144980f0a205581b5d7d656b492d3bc773235

  • Size

    3.4MB

  • Sample

    230327-1n7e2sfd74

  • MD5

    eebfd4f5295c2583c913ac5657cfaf90

  • SHA1

    3b0da17d6ea2aaf3f8b50122baf420cd285f7f78

  • SHA256

    cfb48165cf0c4c1226865468ea9144980f0a205581b5d7d656b492d3bc773235

  • SHA512

    899afd8425d50294f7dc19b838f913f86dc0215e8db099af964b05b565758fe1378677d6667288d4d89317d8c0c9cdf5809f3153cdd66c56c38f344ea8fd4cb7

  • SSDEEP

    98304:oJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRV6:o8D/yIqlhlW4i/QsnwZzjMSeV6

Malware Config

Targets

    • Target

      cfb48165cf0c4c1226865468ea9144980f0a205581b5d7d656b492d3bc773235

    • Size

      3.4MB

    • MD5

      eebfd4f5295c2583c913ac5657cfaf90

    • SHA1

      3b0da17d6ea2aaf3f8b50122baf420cd285f7f78

    • SHA256

      cfb48165cf0c4c1226865468ea9144980f0a205581b5d7d656b492d3bc773235

    • SHA512

      899afd8425d50294f7dc19b838f913f86dc0215e8db099af964b05b565758fe1378677d6667288d4d89317d8c0c9cdf5809f3153cdd66c56c38f344ea8fd4cb7

    • SSDEEP

      98304:oJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRV6:o8D/yIqlhlW4i/QsnwZzjMSeV6

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks