General

  • Target

    ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166

  • Size

    4.3MB

  • Sample

    231013-cp3lgscd77

  • MD5

    ebe933ef7cfd469c32ae9645ea2de327

  • SHA1

    f72c79bfa7abba76afc8eecf72c42fafdd9f050f

  • SHA256

    ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166

  • SHA512

    68d50731f7920ba99f98eaa1c682198b5aa55ce8a7bb5cc3532adee755c82c233f6a04f894e9187daa3a9b094d0a007f615a8fb98d76e0051225245ee0883e71

  • SSDEEP

    98304:PfhMoQk11rKLeOWOSOeytPnHjDD3d0CHYzxZjgImUZ/Cqw1Xp1WT6Zy7mbPqkSk:HWZP9/eytPHT3Mnjg3kq9ZxbPAk

Malware Config

Targets

    • Target

      ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166

    • Size

      4.3MB

    • MD5

      ebe933ef7cfd469c32ae9645ea2de327

    • SHA1

      f72c79bfa7abba76afc8eecf72c42fafdd9f050f

    • SHA256

      ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166

    • SHA512

      68d50731f7920ba99f98eaa1c682198b5aa55ce8a7bb5cc3532adee755c82c233f6a04f894e9187daa3a9b094d0a007f615a8fb98d76e0051225245ee0883e71

    • SSDEEP

      98304:PfhMoQk11rKLeOWOSOeytPnHjDD3d0CHYzxZjgImUZ/Cqw1Xp1WT6Zy7mbPqkSk:HWZP9/eytPHT3Mnjg3kq9ZxbPAk

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks