General

  • Target

    fad275e8b102364e30568a38cb2d8f7b201e2de13973897d415cb3c052733139

  • Size

    5.0MB

  • Sample

    231113-lc5pracb97

  • MD5

    8e676bd7e394be22d5cbb21e10a61e69

  • SHA1

    36fe8d62d15c617d93dd7fca8b6216c75ce20cb8

  • SHA256

    fad275e8b102364e30568a38cb2d8f7b201e2de13973897d415cb3c052733139

  • SHA512

    82cb119f0d536091bd9f794c57ca322e49bafb8049aec2ef212224575502b9390f8a18add310c033b9813210cd210a42189f4892212e45ea023791d94c5a3c3a

  • SSDEEP

    98304:J+7vcHx20RXXj6Q28LrsgmyTRaGdyjRonyV5FoPLCngY2ZyxnPYkKyAX/myq:JAcgUjEgmmRahFhV54L7YBxnPtKNPmyq

Score
10/10

Malware Config

Targets

    • Target

      fad275e8b102364e30568a38cb2d8f7b201e2de13973897d415cb3c052733139

    • Size

      5.0MB

    • MD5

      8e676bd7e394be22d5cbb21e10a61e69

    • SHA1

      36fe8d62d15c617d93dd7fca8b6216c75ce20cb8

    • SHA256

      fad275e8b102364e30568a38cb2d8f7b201e2de13973897d415cb3c052733139

    • SHA512

      82cb119f0d536091bd9f794c57ca322e49bafb8049aec2ef212224575502b9390f8a18add310c033b9813210cd210a42189f4892212e45ea023791d94c5a3c3a

    • SSDEEP

      98304:J+7vcHx20RXXj6Q28LrsgmyTRaGdyjRonyV5FoPLCngY2ZyxnPYkKyAX/myq:JAcgUjEgmmRahFhV54L7YBxnPtKNPmyq

    Score
    10/10
    • Detects DLL dropped by Raspberry Robin.

      Raspberry Robin.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks