General

  • Target

    virustotal.txt

  • Size

    110B

  • Sample

    230716-gf6c8scf56

  • MD5

    225d070db1e15ce65b128edfa60ec81e

  • SHA1

    65f728a51b9da2bcc290a75dd106d5fe07314ffa

  • SHA256

    74f6e04559abc2cd3e7acf03345b99ce131d618f38048363f031764f9f4ce8aa

  • SHA512

    d000b6535064598bbb09bf43bf898da49852b763ca87b9dff42c856329a0c612a47e6ba342aad2c218b1d9007a07b9b5a77b0139f5a8966c88b8c15a1aeb3f67

Score
10/10

Malware Config

Targets

    • Target

      virustotal.txt

    • Size

      110B

    • MD5

      225d070db1e15ce65b128edfa60ec81e

    • SHA1

      65f728a51b9da2bcc290a75dd106d5fe07314ffa

    • SHA256

      74f6e04559abc2cd3e7acf03345b99ce131d618f38048363f031764f9f4ce8aa

    • SHA512

      d000b6535064598bbb09bf43bf898da49852b763ca87b9dff42c856329a0c612a47e6ba342aad2c218b1d9007a07b9b5a77b0139f5a8966c88b8c15a1aeb3f67

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks