General

  • Target

    SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe

  • Size

    5.7MB

  • Sample

    231122-masg3scc9s

  • MD5

    c0ef9d267c5557088c0724b75f1d10b5

  • SHA1

    160a3a4bd2522bf2da9959d46bef2066d69b4e35

  • SHA256

    2b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d

  • SHA512

    ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031

  • SSDEEP

    98304:Pl1miR1gYgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJvHfc10YS29F+bfbJBQJqP:ZgYgNvpbXZ778hsIvY6j15fc1S26TbvP

Malware Config

Targets

    • Target

      SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe

    • Size

      5.7MB

    • MD5

      c0ef9d267c5557088c0724b75f1d10b5

    • SHA1

      160a3a4bd2522bf2da9959d46bef2066d69b4e35

    • SHA256

      2b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d

    • SHA512

      ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031

    • SSDEEP

      98304:Pl1miR1gYgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJvHfc10YS29F+bfbJBQJqP:ZgYgNvpbXZ778hsIvY6j15fc1S26TbvP

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks