General
-
Target
MTA_BSC.exe
-
Size
51.5MB
-
Sample
231112-enq76scg8z
-
MD5
c4ffc88d258cd3aaab24d4d617d1d2af
-
SHA1
a76f00dab5ecccc6e56620694806e245a36af2f8
-
SHA256
497afe4737303d9cf9855c0f79d8c09a22fc43553cff6690cfffddc06e636aa8
-
SHA512
f4117c3033b58d0e142e231e5166e6d372335f3e7e89f084d95ce730f444b71503919aee19590aa5ee23b5b23a4d7bd9be79419e0d326db137e71bbc82cce597
-
SSDEEP
786432:z5sQKOoDAQla1s5iyk2keoT1zrjVdFmfdDXhMsHHUIFnX57BXNQwptIPnc:ziQ2mg7k8Sp5Id7fUI1X1rQwptI0
Static task
static1
Behavioral task
behavioral1
Sample
MTA_BSC.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
MTA_BSC.exe
-
Size
51.5MB
-
MD5
c4ffc88d258cd3aaab24d4d617d1d2af
-
SHA1
a76f00dab5ecccc6e56620694806e245a36af2f8
-
SHA256
497afe4737303d9cf9855c0f79d8c09a22fc43553cff6690cfffddc06e636aa8
-
SHA512
f4117c3033b58d0e142e231e5166e6d372335f3e7e89f084d95ce730f444b71503919aee19590aa5ee23b5b23a4d7bd9be79419e0d326db137e71bbc82cce597
-
SSDEEP
786432:z5sQKOoDAQla1s5iyk2keoT1zrjVdFmfdDXhMsHHUIFnX57BXNQwptIPnc:ziQ2mg7k8Sp5Id7fUI1X1rQwptI0
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-