General

  • Target

    wondershare-filmora-x-11-7-10.exe

  • Size

    445.9MB

  • Sample

    230509-vl6g3sda42

  • MD5

    21dbf14a7cac50f3052e229dab0c4cfc

  • SHA1

    973286a7d74d6ecaa0a97895c58fda898c129a80

  • SHA256

    9c23813e10c0e1bec6e78f6487685d147d9ac1f8f831517258b04832f252b707

  • SHA512

    c93a78d1c29ab60bf719fb2afa19ba850d188ad5c0cb8aa86b328693993bca765484748c0c829f5023029da313b87fb075b13c3b9e9f5352717fd3656e6ecccb

  • SSDEEP

    12582912:hx5oVNAA3qhh9RCTqsXG0M3neabZEBlOam0i:hWA8Wg7Muiil0j

Malware Config

Targets

    • Target

      wondershare-filmora-x-11-7-10.exe

    • Size

      445.9MB

    • MD5

      21dbf14a7cac50f3052e229dab0c4cfc

    • SHA1

      973286a7d74d6ecaa0a97895c58fda898c129a80

    • SHA256

      9c23813e10c0e1bec6e78f6487685d147d9ac1f8f831517258b04832f252b707

    • SHA512

      c93a78d1c29ab60bf719fb2afa19ba850d188ad5c0cb8aa86b328693993bca765484748c0c829f5023029da313b87fb075b13c3b9e9f5352717fd3656e6ecccb

    • SSDEEP

      12582912:hx5oVNAA3qhh9RCTqsXG0M3neabZEBlOam0i:hWA8Wg7Muiil0j

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies Installed Components in the registry

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks