General

  • Target

    fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8

  • Size

    4.6MB

  • Sample

    230526-g5c3zseg2t

  • MD5

    76f37b906c4a210e354d29eeac816b6d

  • SHA1

    2ef9c6c0835315be8805ce039b3c0e0db3c6ef67

  • SHA256

    fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8

  • SHA512

    815b2594f4b40773bd8ec74ffee589d78ca49e4dcbf64bfd269af62a572d7b5f74f33de43788c68a7dff1d3da13343443b1d57b9b86d22b92aad1ae1014f79b7

  • SSDEEP

    98304:l06FOznLo0+Dd6uxc8FazgIGOU0AemtfdQqwWPU0Hnf8H69:l3F6n80W6uGO8bGeAjtfdiWPHnf8I

Score
9/10

Malware Config

Targets

    • Target

      fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8

    • Size

      4.6MB

    • MD5

      76f37b906c4a210e354d29eeac816b6d

    • SHA1

      2ef9c6c0835315be8805ce039b3c0e0db3c6ef67

    • SHA256

      fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8

    • SHA512

      815b2594f4b40773bd8ec74ffee589d78ca49e4dcbf64bfd269af62a572d7b5f74f33de43788c68a7dff1d3da13343443b1d57b9b86d22b92aad1ae1014f79b7

    • SSDEEP

      98304:l06FOznLo0+Dd6uxc8FazgIGOU0AemtfdQqwWPU0Hnf8H69:l3F6n80W6uGO8bGeAjtfdiWPHnf8I

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks