General

  • Target

    050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c_JC.lnk

  • Size

    4.4MB

  • Sample

    231011-nj2b1sbg6x

  • MD5

    45aca657889ac60f1ee129c5c8442cdb

  • SHA1

    5db63aa4f87c6194d62b2e2e59c54bfcf9fbc9fc

  • SHA256

    050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c

  • SHA512

    0f76eb2f8685c9659805efefcf22e593f51622886415c1f238a479d2594a9ada13966ee0cd651adb7fb66a106f34e2c0deddc180207301263d1cc5caff7191ef

  • SSDEEP

    98304:agHgGZPRjDjDN/v1gFXzz3WC9rW4IowsS7gpfCRhPhajd7H/:akPRj/DBNgF+CPIow57gIPIjdH/

Malware Config

Targets

    • Target

      050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c_JC.lnk

    • Size

      4.4MB

    • MD5

      45aca657889ac60f1ee129c5c8442cdb

    • SHA1

      5db63aa4f87c6194d62b2e2e59c54bfcf9fbc9fc

    • SHA256

      050c65d45e5f21018aa940f0188c4aa1318ac3df865d901f8643ed7ce4a4b52c

    • SHA512

      0f76eb2f8685c9659805efefcf22e593f51622886415c1f238a479d2594a9ada13966ee0cd651adb7fb66a106f34e2c0deddc180207301263d1cc5caff7191ef

    • SSDEEP

      98304:agHgGZPRjDjDN/v1gFXzz3WC9rW4IowsS7gpfCRhPhajd7H/:akPRj/DBNgF+CPIow57gIPIjdH/

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks