General
-
Target
Kies3Setup.exe
-
Size
35.4MB
-
Sample
230421-wlv7sahb94
-
MD5
f904aea2544df0d9bc37acad4d3c76e0
-
SHA1
f4deee69a46eb8d6bbe71bb71433a0eda2f1d4f5
-
SHA256
47685b74eeda5f4a0144dd9ff2efe37f1d1cce49e69ee100575fb165419f1752
-
SHA512
d21069a2572b6f9f11d28aed002fbd573d2ed1969f08fc42f8ec721e32f76264d4ee04f5c99eef1fb72b0a885a295787b542debd236aa6de40bc8e4ff4a27e9c
-
SSDEEP
786432:bW7clCko40pL160REJ/1FD6vX9SP9XYJZBlNE3tzG6qm:ucM40i0w/buX4PBYfjNEVGFm
Static task
static1
Malware Config
Targets
-
-
Target
Kies3Setup.exe
-
Size
35.4MB
-
MD5
f904aea2544df0d9bc37acad4d3c76e0
-
SHA1
f4deee69a46eb8d6bbe71bb71433a0eda2f1d4f5
-
SHA256
47685b74eeda5f4a0144dd9ff2efe37f1d1cce49e69ee100575fb165419f1752
-
SHA512
d21069a2572b6f9f11d28aed002fbd573d2ed1969f08fc42f8ec721e32f76264d4ee04f5c99eef1fb72b0a885a295787b542debd236aa6de40bc8e4ff4a27e9c
-
SSDEEP
786432:bW7clCko40pL160REJ/1FD6vX9SP9XYJZBlNE3tzG6qm:ucM40i0w/buX4PBYfjNEVGFm
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-