General

  • Target

    bat_win_spoofer_V2.exe

  • Size

    5.3MB

  • Sample

    231122-s5fdwsea6v

  • MD5

    a51b03d97b998e3c3fa32cae922da7ee

  • SHA1

    762286e273a51c3af772b37528f22c4c11c5d44b

  • SHA256

    34cee39adde2085b35877f67de147823542b42abe65b7b0cccee40bc58a5713f

  • SHA512

    e00475411326d74a825be3112383684cee5dca67cd00cea5aa62c47a5d56b0330ab7d08e1403051b746aafd722080e7ff484915bd7ab2623413786e4c127bb72

  • SSDEEP

    98304:71mP2axDElUcnFcsB+fe74m6n4k/nPS53bGGaW1wcOU6VtbOGmUIjIQ82rjM9gm7:JkolfpM49LdHOU6/O3X+2/M9uE

Malware Config

Targets

    • Target

      bat_win_spoofer_V2.exe

    • Size

      5.3MB

    • MD5

      a51b03d97b998e3c3fa32cae922da7ee

    • SHA1

      762286e273a51c3af772b37528f22c4c11c5d44b

    • SHA256

      34cee39adde2085b35877f67de147823542b42abe65b7b0cccee40bc58a5713f

    • SHA512

      e00475411326d74a825be3112383684cee5dca67cd00cea5aa62c47a5d56b0330ab7d08e1403051b746aafd722080e7ff484915bd7ab2623413786e4c127bb72

    • SSDEEP

      98304:71mP2axDElUcnFcsB+fe74m6n4k/nPS53bGGaW1wcOU6VtbOGmUIjIQ82rjM9gm7:JkolfpM49LdHOU6/O3X+2/M9uE

    • Looks for VirtualBox Guest Additions in registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks