General

  • Target

    8a7719ee5bdcc9b69f0e84119c0818d8ece9ef401f645bd10fb4d4c92c983b1a

  • Size

    3.4MB

  • Sample

    230328-qlhnssbc36

  • MD5

    5e97b518de975729742e3a63780794b6

  • SHA1

    c240a9fafb611989dec640dd3a5374c47295b56f

  • SHA256

    8a7719ee5bdcc9b69f0e84119c0818d8ece9ef401f645bd10fb4d4c92c983b1a

  • SHA512

    4320c491f9b7b8a5f789bc199524d7b5a9d2cdf55ae0a33849282aa91f3cc6856ac1fd4e428766de70234e126abae6d42deab8fea4324443e1909a8b5d5e2dde

  • SSDEEP

    98304:QUwOIEK84WQsykAeYIkAeYUaMImg8C0QuNoJuR21C/yIq/dhl/O4i/TksjdFwvhm:QUwOIEK84WQsykAeYIkAeYUaMImg8C0p

Malware Config

Targets

    • Target

      8a7719ee5bdcc9b69f0e84119c0818d8ece9ef401f645bd10fb4d4c92c983b1a

    • Size

      3.4MB

    • MD5

      5e97b518de975729742e3a63780794b6

    • SHA1

      c240a9fafb611989dec640dd3a5374c47295b56f

    • SHA256

      8a7719ee5bdcc9b69f0e84119c0818d8ece9ef401f645bd10fb4d4c92c983b1a

    • SHA512

      4320c491f9b7b8a5f789bc199524d7b5a9d2cdf55ae0a33849282aa91f3cc6856ac1fd4e428766de70234e126abae6d42deab8fea4324443e1909a8b5d5e2dde

    • SSDEEP

      98304:QUwOIEK84WQsykAeYIkAeYUaMImg8C0QuNoJuR21C/yIq/dhl/O4i/TksjdFwvhm:QUwOIEK84WQsykAeYIkAeYUaMImg8C0p

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks