General

  • Target

    file.exe

  • Size

    3.5MB

  • Sample

    230719-1ba63sbc56

  • MD5

    00849efbfc868301729148fa957e35b7

  • SHA1

    fdf3feedc18b8806f3bb15e785907d2a738859bb

  • SHA256

    e2cd080304d92494e731ad88d60f1ba38670ba4a751cd8df1e09d6702345999b

  • SHA512

    a2c5eb6ba6e88cb8aef2c3d8464770bd65afbda0a88bbc4f6704b2679cfcb938d9cdaea5d15929b6e45cebee5445ca479c204b3579d6170d70f37e8133728f53

  • SSDEEP

    98304:Owp1OWggbmRn32RdGZXutOldZz/aSXtxpso:OwpUW/hu+eZz/aSXtrZ

Malware Config

Targets

    • Target

      file.exe

    • Size

      3.5MB

    • MD5

      00849efbfc868301729148fa957e35b7

    • SHA1

      fdf3feedc18b8806f3bb15e785907d2a738859bb

    • SHA256

      e2cd080304d92494e731ad88d60f1ba38670ba4a751cd8df1e09d6702345999b

    • SHA512

      a2c5eb6ba6e88cb8aef2c3d8464770bd65afbda0a88bbc4f6704b2679cfcb938d9cdaea5d15929b6e45cebee5445ca479c204b3579d6170d70f37e8133728f53

    • SSDEEP

      98304:Owp1OWggbmRn32RdGZXutOldZz/aSXtxpso:OwpUW/hu+eZz/aSXtrZ

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks