General

  • Target

    42fa296e59c6e6303ce63d9617a024caee110706a5b8bd979e37daf68c8ff337

  • Size

    3.4MB

  • Sample

    230327-ps6tjafe31

  • MD5

    472497db67de912dbe13c9e637f5589e

  • SHA1

    60992cf8ca0c26ef1e02e1c6731068cf6e85f9ff

  • SHA256

    42fa296e59c6e6303ce63d9617a024caee110706a5b8bd979e37daf68c8ff337

  • SHA512

    7fb9cc50bb9e0074739d139b51c9dc1cb9ae523958139dfe855a47db31d2775c1abecc907b2bf8ffb7bbac072d0f53ac3b8e97858bef27fb1b9de98a60efcd8a

  • SSDEEP

    49152:f9x5EciXT1SMTEGUlayCd1XlOrUcwFY92eg6zBCYUFQumEeBAoCuYXMYo3js:mcmEZlaPfUwbYIelzBLU3vqCRs

Malware Config

Targets

    • Target

      42fa296e59c6e6303ce63d9617a024caee110706a5b8bd979e37daf68c8ff337

    • Size

      3.4MB

    • MD5

      472497db67de912dbe13c9e637f5589e

    • SHA1

      60992cf8ca0c26ef1e02e1c6731068cf6e85f9ff

    • SHA256

      42fa296e59c6e6303ce63d9617a024caee110706a5b8bd979e37daf68c8ff337

    • SHA512

      7fb9cc50bb9e0074739d139b51c9dc1cb9ae523958139dfe855a47db31d2775c1abecc907b2bf8ffb7bbac072d0f53ac3b8e97858bef27fb1b9de98a60efcd8a

    • SSDEEP

      49152:f9x5EciXT1SMTEGUlayCd1XlOrUcwFY92eg6zBCYUFQumEeBAoCuYXMYo3js:mcmEZlaPfUwbYIelzBLU3vqCRs

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks