General

  • Target

    371a6a1c8f54420097aad2c5d56881c2.bin

  • Size

    6.1MB

  • Sample

    231223-bqa27adhar

  • MD5

    371a6a1c8f54420097aad2c5d56881c2

  • SHA1

    4d26810613a17f84b9c04e7f13fd14f3823a391f

  • SHA256

    e850559ebc260d4643cd9926547e4a2369fd1c23291036a99276ec881303fa31

  • SHA512

    6da6b41d6d3c1621cb2eb4a41d0d59ee98427450ac7459690eeae62e0a3ca7fb51692ca56dd4f15d7345e64b3e0d957672ee5c886be467df7173052fe587cdef

  • SSDEEP

    196608:pdrH+u+zPFjxAuIQOSqHzEbGL+s9oqp3nQJ:OlzP3aQqemboo30

Malware Config

Targets

    • Target

      371a6a1c8f54420097aad2c5d56881c2.bin

    • Size

      6.1MB

    • MD5

      371a6a1c8f54420097aad2c5d56881c2

    • SHA1

      4d26810613a17f84b9c04e7f13fd14f3823a391f

    • SHA256

      e850559ebc260d4643cd9926547e4a2369fd1c23291036a99276ec881303fa31

    • SHA512

      6da6b41d6d3c1621cb2eb4a41d0d59ee98427450ac7459690eeae62e0a3ca7fb51692ca56dd4f15d7345e64b3e0d957672ee5c886be467df7173052fe587cdef

    • SSDEEP

      196608:pdrH+u+zPFjxAuIQOSqHzEbGL+s9oqp3nQJ:OlzP3aQqemboo30

    • Detected google phishing page

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks