Resubmissions

03-01-2024 14:58

240103-scdplafcfk 9

03-01-2024 14:52

240103-r88zyafbgn 9

General

  • Target

    MatSploit.exe

  • Size

    5.5MB

  • Sample

    240103-r88zyafbgn

  • MD5

    9e0513f49b3bb36ea8e2021114c05cc4

  • SHA1

    48f8a10ef94aaab148226deee2fd648814732317

  • SHA256

    bab0af44c41ebaf4ba8ae3209d852247e9b443154e626dbdf003a076c1e88abc

  • SHA512

    2d93d1579dd2324d854971bafe5c7ae0ed79df45b551c18d238e05f2b2d9fed70d696f9b145ac30db7abea7565a4196d2a6726ae00771341f1f898a785767123

  • SSDEEP

    98304:O/G5xtyMrU1eOyjaG8uOJQToGRtVtmNh6/wfi2dxIkbyFQ0g/QjESYaBheEBrbiD:+wOK8uRTLvtmUwfxtWQ0gkbhcjSW

Malware Config

Targets

    • Target

      MatSploit.exe

    • Size

      5.5MB

    • MD5

      9e0513f49b3bb36ea8e2021114c05cc4

    • SHA1

      48f8a10ef94aaab148226deee2fd648814732317

    • SHA256

      bab0af44c41ebaf4ba8ae3209d852247e9b443154e626dbdf003a076c1e88abc

    • SHA512

      2d93d1579dd2324d854971bafe5c7ae0ed79df45b551c18d238e05f2b2d9fed70d696f9b145ac30db7abea7565a4196d2a6726ae00771341f1f898a785767123

    • SSDEEP

      98304:O/G5xtyMrU1eOyjaG8uOJQToGRtVtmNh6/wfi2dxIkbyFQ0g/QjESYaBheEBrbiD:+wOK8uRTLvtmUwfxtWQ0gkbhcjSW

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks