General

  • Target

    loaderprotectedexeexe.exe

  • Size

    18.7MB

  • Sample

    230704-tarzwafa63

  • MD5

    739daeed77f6569d1b14ed9b307c0af0

  • SHA1

    c600c3596e1a27e75579142c94f96ad646125bc2

  • SHA256

    86dd80dd1bf3592bc8de07d7c4f2cb2a877be89ca26ad5e918888fd3948949e1

  • SHA512

    27d4dc4d43a75f8eb864e21a615c8c19f2da8ca3f2ee24fb6450da00343594d14dd2eec6c87708390675982e975ab476bdf6255d453efcd5c3cdd1a9ec3e650e

  • SSDEEP

    393216:zosm7zFZDna78H3w7snlQah4jw5aI+1WspjcXweGWMjJtcRTHfQ:zeVZ2oX7n+y4j8PoeGlXYzI

Malware Config

Targets

    • Target

      loaderprotectedexeexe.exe

    • Size

      18.7MB

    • MD5

      739daeed77f6569d1b14ed9b307c0af0

    • SHA1

      c600c3596e1a27e75579142c94f96ad646125bc2

    • SHA256

      86dd80dd1bf3592bc8de07d7c4f2cb2a877be89ca26ad5e918888fd3948949e1

    • SHA512

      27d4dc4d43a75f8eb864e21a615c8c19f2da8ca3f2ee24fb6450da00343594d14dd2eec6c87708390675982e975ab476bdf6255d453efcd5c3cdd1a9ec3e650e

    • SSDEEP

      393216:zosm7zFZDna78H3w7snlQah4jw5aI+1WspjcXweGWMjJtcRTHfQ:zeVZ2oX7n+y4j8PoeGlXYzI

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks