General

  • Target

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

  • Size

    5.7MB

  • Sample

    231122-fj6bzabb5w

  • MD5

    a6d0999d10c4d3a1aee18d73693a5b13

  • SHA1

    298d75d1850f7596991aa739fd73738982792442

  • SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

  • SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • SSDEEP

    98304:9BALWhkuHRdKG2B746zHzhEgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJoBeTPRZ:9mahkuHRl2jzGgNvpbXZ778hsIvY6j1R

Malware Config

Targets

    • Target

      aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    • Size

      5.7MB

    • MD5

      a6d0999d10c4d3a1aee18d73693a5b13

    • SHA1

      298d75d1850f7596991aa739fd73738982792442

    • SHA256

      aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    • SHA512

      f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

    • SSDEEP

      98304:9BALWhkuHRdKG2B746zHzhEgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJoBeTPRZ:9mahkuHRl2jzGgNvpbXZ778hsIvY6j1R

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks