General

  • Target

    c7465fd84271c7907ca30fa96d3d0e78b7ac9c46d02d9236ca32397490d888d1

  • Size

    4.3MB

  • Sample

    231106-lqmfbsbh82

  • MD5

    8cdcfb6b72fdbbfaa0b344c45249dad6

  • SHA1

    b18f8d9ccf0d18dc69521687e05f4daebd998238

  • SHA256

    c7465fd84271c7907ca30fa96d3d0e78b7ac9c46d02d9236ca32397490d888d1

  • SHA512

    c99e72f81942c59c2863b5fe39170138b0e5075b03aff0504ec07a5b3b1853051df5a643f72991a749a4ec46c0245ccb0efe81985d0274caa5706f69e0ff6903

  • SSDEEP

    98304:zvho60OBVd3SblPhyafhffQ3DULEe9RDc35adl:L7L9ibDyafhflptt

Malware Config

Targets

    • Target

      c7465fd84271c7907ca30fa96d3d0e78b7ac9c46d02d9236ca32397490d888d1

    • Size

      4.3MB

    • MD5

      8cdcfb6b72fdbbfaa0b344c45249dad6

    • SHA1

      b18f8d9ccf0d18dc69521687e05f4daebd998238

    • SHA256

      c7465fd84271c7907ca30fa96d3d0e78b7ac9c46d02d9236ca32397490d888d1

    • SHA512

      c99e72f81942c59c2863b5fe39170138b0e5075b03aff0504ec07a5b3b1853051df5a643f72991a749a4ec46c0245ccb0efe81985d0274caa5706f69e0ff6903

    • SSDEEP

      98304:zvho60OBVd3SblPhyafhffQ3DULEe9RDc35adl:L7L9ibDyafhflptt

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks