General

  • Target

    36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6

  • Size

    3.4MB

  • Sample

    230328-f6cceaah7v

  • MD5

    9383f0739c9ec8fa2f115488b6149b00

  • SHA1

    f7de0fe9da6b48295c6233f081d3647209ab266f

  • SHA256

    36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6

  • SHA512

    4e84f36d05b5e8fbfcf2ee5616ee6af85fee56a8ccacce088bfbf4ef97467f8d52e027f0e8e77776443843c9ebd658e00608659d305321ca5c0350736db94a83

  • SSDEEP

    98304:7JuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:78D/yIqlhlW4i/QsnwZzjMSeVq

Malware Config

Targets

    • Target

      36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6

    • Size

      3.4MB

    • MD5

      9383f0739c9ec8fa2f115488b6149b00

    • SHA1

      f7de0fe9da6b48295c6233f081d3647209ab266f

    • SHA256

      36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6

    • SHA512

      4e84f36d05b5e8fbfcf2ee5616ee6af85fee56a8ccacce088bfbf4ef97467f8d52e027f0e8e77776443843c9ebd658e00608659d305321ca5c0350736db94a83

    • SSDEEP

      98304:7JuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:78D/yIqlhlW4i/QsnwZzjMSeVq

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks