General

  • Target

    7f0daccb21714ad5b34080439c740ed58d57be6a5d5757334f78c1f343aa78e3

  • Size

    3.4MB

  • Sample

    230328-t9fqwsdf9x

  • MD5

    ceea64b335234e970145f02cf3fba8f0

  • SHA1

    33a45bf87d4b648d9c16e3f8aab8595af0431d83

  • SHA256

    7f0daccb21714ad5b34080439c740ed58d57be6a5d5757334f78c1f343aa78e3

  • SHA512

    4995c8b1df043b90e7161d2f01c578300416a0e1e79414d6b64d757e0b4ee7ad323aaaf0cc0899953a4cd5a1d823719663abe0b7d5fcc67fab78ce1ee5fb0fc3

  • SSDEEP

    98304:jUwOIEK84WQsykAeYYkAeYUaMImg8C0QuSJuR21C/yIq/dhl/O4i/TksjdFwvhzq:jUwOIEK84WQsykAeYYkAeYUaMImg8C0J

Malware Config

Targets

    • Target

      7f0daccb21714ad5b34080439c740ed58d57be6a5d5757334f78c1f343aa78e3

    • Size

      3.4MB

    • MD5

      ceea64b335234e970145f02cf3fba8f0

    • SHA1

      33a45bf87d4b648d9c16e3f8aab8595af0431d83

    • SHA256

      7f0daccb21714ad5b34080439c740ed58d57be6a5d5757334f78c1f343aa78e3

    • SHA512

      4995c8b1df043b90e7161d2f01c578300416a0e1e79414d6b64d757e0b4ee7ad323aaaf0cc0899953a4cd5a1d823719663abe0b7d5fcc67fab78ce1ee5fb0fc3

    • SSDEEP

      98304:jUwOIEK84WQsykAeYYkAeYUaMImg8C0QuSJuR21C/yIq/dhl/O4i/TksjdFwvhzq:jUwOIEK84WQsykAeYYkAeYUaMImg8C0J

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks