General

  • Target

    2b54ccc44e89581b1005e8b6f24a7822

  • Size

    4.6MB

  • Sample

    231225-tf222acafk

  • MD5

    2b54ccc44e89581b1005e8b6f24a7822

  • SHA1

    d7de533078a3d1204e1a0c9440501928e0cf1285

  • SHA256

    aef5c612c2920526ea0ccc636e689417885c2dfb17793de9a259d6ced6fdd7cc

  • SHA512

    c8e1bf41b5dfe40bbf39cc534099c5224851ba8b97f545262eac0790c3cc3bcc7c1d381e6f95c4c2884d3979e1ee8e51b615adc182a726d591c5eeefec5ad120

  • SSDEEP

    98304:8egQ59+/2UJtuHRTcJ1VzRasOnSDyE8m9j1EB+:KU+OdTejOSDyu2s

Malware Config

Targets

    • Target

      2b54ccc44e89581b1005e8b6f24a7822

    • Size

      4.6MB

    • MD5

      2b54ccc44e89581b1005e8b6f24a7822

    • SHA1

      d7de533078a3d1204e1a0c9440501928e0cf1285

    • SHA256

      aef5c612c2920526ea0ccc636e689417885c2dfb17793de9a259d6ced6fdd7cc

    • SHA512

      c8e1bf41b5dfe40bbf39cc534099c5224851ba8b97f545262eac0790c3cc3bcc7c1d381e6f95c4c2884d3979e1ee8e51b615adc182a726d591c5eeefec5ad120

    • SSDEEP

      98304:8egQ59+/2UJtuHRTcJ1VzRasOnSDyE8m9j1EB+:KU+OdTejOSDyu2s

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks