General

  • Target

    2ud.exe

  • Size

    4.2MB

  • Sample

    230329-ajldxaea45

  • MD5

    f2d96a7c78bacbdeb6a64f4b61a9eb80

  • SHA1

    019d4951a57bc0bd6957c5aec24809b5449b8f45

  • SHA256

    7063be36bb3a4a97742cdf3ddb85a25285b50bfadae5111e5b48ddd18d583e78

  • SHA512

    0932e638fc72af2ecd948305bcf3f29d25677de84bc001b6a62d4339640f111dc988f9e41a7c819906d027e7c5549165b5b123b84945bfd67918e9bbaa7a1eed

  • SSDEEP

    98304:ZNVpIBX3kf5xfyCgwbdHiVoZXSBjyVEnk/YRow0EcgUn5OxEiXHAa:LV+Z0fLyxwbdVZujGEnUYT7cgK4WiXHv

Malware Config

Targets

    • Target

      2ud.exe

    • Size

      4.2MB

    • MD5

      f2d96a7c78bacbdeb6a64f4b61a9eb80

    • SHA1

      019d4951a57bc0bd6957c5aec24809b5449b8f45

    • SHA256

      7063be36bb3a4a97742cdf3ddb85a25285b50bfadae5111e5b48ddd18d583e78

    • SHA512

      0932e638fc72af2ecd948305bcf3f29d25677de84bc001b6a62d4339640f111dc988f9e41a7c819906d027e7c5549165b5b123b84945bfd67918e9bbaa7a1eed

    • SSDEEP

      98304:ZNVpIBX3kf5xfyCgwbdHiVoZXSBjyVEnk/YRow0EcgUn5OxEiXHAa:LV+Z0fLyxwbdVZujGEnUYT7cgK4WiXHv

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Impair Defenses

1
T1562

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks