General

  • Target

    f14ff29c31fb7f6a27e75f925000475fd103a924466a55426e1ea314870df500

  • Size

    3.4MB

  • Sample

    230328-bfa97sgb59

  • MD5

    03e57c419d5bf3221c69a098085f9ff2

  • SHA1

    a7d708e9f356be139f90c2db787939e9a5eb4f2e

  • SHA256

    f14ff29c31fb7f6a27e75f925000475fd103a924466a55426e1ea314870df500

  • SHA512

    8c8fab2114e5d05d3d5c85558e4e7480fb93e210bc1dadc001131c2292034083f7920721396ffeedba65cdb0dcde0faee2b36f05e2e46b06749564dd5c398a83

  • SSDEEP

    98304:kJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:k8D/yIqlhlW4i/QsnwZzjMSeVq

Malware Config

Targets

    • Target

      f14ff29c31fb7f6a27e75f925000475fd103a924466a55426e1ea314870df500

    • Size

      3.4MB

    • MD5

      03e57c419d5bf3221c69a098085f9ff2

    • SHA1

      a7d708e9f356be139f90c2db787939e9a5eb4f2e

    • SHA256

      f14ff29c31fb7f6a27e75f925000475fd103a924466a55426e1ea314870df500

    • SHA512

      8c8fab2114e5d05d3d5c85558e4e7480fb93e210bc1dadc001131c2292034083f7920721396ffeedba65cdb0dcde0faee2b36f05e2e46b06749564dd5c398a83

    • SSDEEP

      98304:kJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:k8D/yIqlhlW4i/QsnwZzjMSeVq

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks