General

  • Target

    3e00fe5e990e0e6ddc28f09770f303e408136970438aca19e9e5836b6d905f9f

  • Size

    5.6MB

  • Sample

    231013-alflfaff91

  • MD5

    5c3131fbf8c063f6e8e615e01a4e61be

  • SHA1

    3f4fad210a8a61a5bebc0fc271c13ea2085deef3

  • SHA256

    3e00fe5e990e0e6ddc28f09770f303e408136970438aca19e9e5836b6d905f9f

  • SHA512

    bdee56ab3ed50e2945804d549613595941717ce2c21c68f13497f9b06adf623012ad43b1dab64d2f14e1884490a5803a86943e94fc58ba16eafb5fc9452f89d3

  • SSDEEP

    98304:6Q0ZQopl5vJX+d8TCaU+ILUrH7l2+dcso57hbYXl9TSIEUFEEdmcf2Jrl6UAkoTq:YQopbvt+WTCaU+IUrH7lqsohhk+IENcY

Malware Config

Targets

    • Target

      3e00fe5e990e0e6ddc28f09770f303e408136970438aca19e9e5836b6d905f9f

    • Size

      5.6MB

    • MD5

      5c3131fbf8c063f6e8e615e01a4e61be

    • SHA1

      3f4fad210a8a61a5bebc0fc271c13ea2085deef3

    • SHA256

      3e00fe5e990e0e6ddc28f09770f303e408136970438aca19e9e5836b6d905f9f

    • SHA512

      bdee56ab3ed50e2945804d549613595941717ce2c21c68f13497f9b06adf623012ad43b1dab64d2f14e1884490a5803a86943e94fc58ba16eafb5fc9452f89d3

    • SSDEEP

      98304:6Q0ZQopl5vJX+d8TCaU+ILUrH7l2+dcso57hbYXl9TSIEUFEEdmcf2Jrl6UAkoTq:YQopbvt+WTCaU+IUrH7lqsohhk+IENcY

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks