General

  • Target

    6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

  • Size

    2.9MB

  • Sample

    230417-q2542aed75

  • MD5

    85150fc161f06e745f463388cd0fff4f

  • SHA1

    38528c83c1fca3bdd07d6ed03a95deaab5e2b453

  • SHA256

    6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

  • SHA512

    e505eaad59721c5f0ecce973b1a54394c164d47318ce6c6dad444f72696d8c50eb96b824377ec8ecb3c49f2e87541b70bc337e0e3bc38f03dce7c7342cf9acfe

  • SSDEEP

    49152:iTuQ/+UDDq542HWdVlV7t2ftBl2fULWXBnWXg/wOy6vb3dvwM3Qh5h:iTu4+U/2QlVmtBaJw6z3Nwj

Malware Config

Targets

    • Target

      6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

    • Size

      2.9MB

    • MD5

      85150fc161f06e745f463388cd0fff4f

    • SHA1

      38528c83c1fca3bdd07d6ed03a95deaab5e2b453

    • SHA256

      6e49adb9932cd17f4b40af488ebf866d6de827dd7746ed1c47ed761c7f2ce4b6

    • SHA512

      e505eaad59721c5f0ecce973b1a54394c164d47318ce6c6dad444f72696d8c50eb96b824377ec8ecb3c49f2e87541b70bc337e0e3bc38f03dce7c7342cf9acfe

    • SSDEEP

      49152:iTuQ/+UDDq542HWdVlV7t2ftBl2fULWXBnWXg/wOy6vb3dvwM3Qh5h:iTu4+U/2QlVmtBaJw6z3Nwj

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.