General

  • Target

    6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

  • Size

    2.9MB

  • Sample

    230417-q2542aed75

  • MD5

    85150fc161f06e745f463388cd0fff4f

  • SHA1

    38528c83c1fca3bdd07d6ed03a95deaab5e2b453

  • SHA256

    6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

  • SHA512

    e505eaad59721c5f0ecce973b1a54394c164d47318ce6c6dad444f72696d8c50eb96b824377ec8ecb3c49f2e87541b70bc337e0e3bc38f03dce7c7342cf9acfe

  • SSDEEP

    49152:iTuQ/+UDDq542HWdVlV7t2ftBl2fULWXBnWXg/wOy6vb3dvwM3Qh5h:iTu4+U/2QlVmtBaJw6z3Nwj

Malware Config

Targets

    • Target

      6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

    • Size

      2.9MB

    • MD5

      85150fc161f06e745f463388cd0fff4f

    • SHA1

      38528c83c1fca3bdd07d6ed03a95deaab5e2b453

    • SHA256

      6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

    • SHA512

      e505eaad59721c5f0ecce973b1a54394c164d47318ce6c6dad444f72696d8c50eb96b824377ec8ecb3c49f2e87541b70bc337e0e3bc38f03dce7c7342cf9acfe

    • SSDEEP

      49152:iTuQ/+UDDq542HWdVlV7t2ftBl2fULWXBnWXg/wOy6vb3dvwM3Qh5h:iTu4+U/2QlVmtBaJw6z3Nwj

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks