General

  • Target

    updater.exe

  • Size

    150.1MB

  • Sample

    231118-zcfyaafe99

  • MD5

    50d4debceee779bdc030f5997a8d3ffc

  • SHA1

    9154fb52404b2f673d5a2f07dd70dc39239ff229

  • SHA256

    6cbedd2be007d13ba423469aacafcaab33e6669eead026be6acb82adac83f195

  • SHA512

    2250e3da04c927964ea6613348f6ca9ad083b21d58dce80e5b149a3f920ee5da6cbd9b3fba20e93481e797f209783aac6b8d9749d0d3c26c9ef8bdc072209901

  • SSDEEP

    786432:QTKLbMT/OBq3F/Fje9VO5mUWc1F3UINm4C1gluE4DmSvI/iuT9FaSc:QTKLbMThfCamUWUBUIE4CQubWK

Malware Config

Targets

    • Target

      updater.exe

    • Size

      150.1MB

    • MD5

      50d4debceee779bdc030f5997a8d3ffc

    • SHA1

      9154fb52404b2f673d5a2f07dd70dc39239ff229

    • SHA256

      6cbedd2be007d13ba423469aacafcaab33e6669eead026be6acb82adac83f195

    • SHA512

      2250e3da04c927964ea6613348f6ca9ad083b21d58dce80e5b149a3f920ee5da6cbd9b3fba20e93481e797f209783aac6b8d9749d0d3c26c9ef8bdc072209901

    • SSDEEP

      786432:QTKLbMT/OBq3F/Fje9VO5mUWc1F3UINm4C1gluE4DmSvI/iuT9FaSc:QTKLbMThfCamUWUBUIE4CQubWK

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks