General

  • Target

    RazerSynapse_JC.exe

  • Size

    5.6MB

  • Sample

    230901-wmlpqsgd9t

  • MD5

    28833c2c2f11d7f5bf184ba75e5fe85d

  • SHA1

    c37c2c32e980facf98f1c1a756eb1d6f48817e8f

  • SHA256

    52ab2c2ff02a1f69ce5cbbe17b4c98ee62f37b1507c14b4574da012a2e3eb5d7

  • SHA512

    6198ecb271be29b9e8bb91d4c0a8a88d738472456fea497aec3d56d5ddbbdbb85fc9a549b6f196314ed93cf288465a117577db58f43e7feca3b273f3bd13b011

  • SSDEEP

    98304:2bY0k0m1Ckswpguw85fj4hBb1OSFAFllTSPE2Zap9uLHlpNTo84aRoSDb:2brE12Wgu/8OuAFllT7em9oHlpxdg

Malware Config

Targets

    • Target

      RazerSynapse_JC.exe

    • Size

      5.6MB

    • MD5

      28833c2c2f11d7f5bf184ba75e5fe85d

    • SHA1

      c37c2c32e980facf98f1c1a756eb1d6f48817e8f

    • SHA256

      52ab2c2ff02a1f69ce5cbbe17b4c98ee62f37b1507c14b4574da012a2e3eb5d7

    • SHA512

      6198ecb271be29b9e8bb91d4c0a8a88d738472456fea497aec3d56d5ddbbdbb85fc9a549b6f196314ed93cf288465a117577db58f43e7feca3b273f3bd13b011

    • SSDEEP

      98304:2bY0k0m1Ckswpguw85fj4hBb1OSFAFllTSPE2Zap9uLHlpNTo84aRoSDb:2brE12Wgu/8OuAFllT7em9oHlpxdg

    • Looks for VirtualBox Guest Additions in registry

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks