General

  • Target

    tmp

  • Size

    5.5MB

  • Sample

    231123-2c6vtadg4x

  • MD5

    7f8632e087ebf8eb9a4638f4da5cbed8

  • SHA1

    ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789

  • SHA256

    5480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f

  • SHA512

    b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea

  • SSDEEP

    98304:CgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJliBN0FLKhsxNv/jA1MXXgnFtEZHOk:CgNvpbXZ778hsIvY6j1mBIN0MniXitky

Malware Config

Targets

    • Target

      tmp

    • Size

      5.5MB

    • MD5

      7f8632e087ebf8eb9a4638f4da5cbed8

    • SHA1

      ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789

    • SHA256

      5480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f

    • SHA512

      b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea

    • SSDEEP

      98304:CgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJliBN0FLKhsxNv/jA1MXXgnFtEZHOk:CgNvpbXZ778hsIvY6j1mBIN0MniXitky

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks