General

  • Target

    34a6bee05ae1cd4867079eecfc851ce0780fd808889b403c5e3bcbe6d38a9adc

  • Size

    3.4MB

  • Sample

    230327-ypy4ysfa56

  • MD5

    7091d94999f271f0368e3dadaa9df71b

  • SHA1

    a1f0bd53b03f42a47ff96f99fd6cc3a01770b6a7

  • SHA256

    34a6bee05ae1cd4867079eecfc851ce0780fd808889b403c5e3bcbe6d38a9adc

  • SHA512

    a921ea110d932d94063796c6969bc1fc206f33d015a1e88018b3843064293d08bb0fd0ae1e6bd4c6cb9b7739270ecc6ea89d0554e23f1a30cef9d2bf353435a8

  • SSDEEP

    98304:RJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRV6:R8D/yIqlhlW4i/QsnwZzjMSeV6

Malware Config

Targets

    • Target

      34a6bee05ae1cd4867079eecfc851ce0780fd808889b403c5e3bcbe6d38a9adc

    • Size

      3.4MB

    • MD5

      7091d94999f271f0368e3dadaa9df71b

    • SHA1

      a1f0bd53b03f42a47ff96f99fd6cc3a01770b6a7

    • SHA256

      34a6bee05ae1cd4867079eecfc851ce0780fd808889b403c5e3bcbe6d38a9adc

    • SHA512

      a921ea110d932d94063796c6969bc1fc206f33d015a1e88018b3843064293d08bb0fd0ae1e6bd4c6cb9b7739270ecc6ea89d0554e23f1a30cef9d2bf353435a8

    • SSDEEP

      98304:RJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRV6:R8D/yIqlhlW4i/QsnwZzjMSeV6

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks