General

  • Target

    b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e

  • Size

    4.8MB

  • Sample

    240119-lhbzmabgg9

  • MD5

    192f74c4eb3a499b12d19184de60d5b1

  • SHA1

    764dcd8cbeb93bbc06c040e2b1afe625fc5b07e2

  • SHA256

    b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e

  • SHA512

    975fa7be617ce1672c081e0010a20124ea255178aa56f2ff708451e02ee6c72fa6bb38a324d7c488d1725b2849fdfcaa6d0c3c241a2375271bef212ad0da5e3b

  • SSDEEP

    98304:T8DpgICmUlkWKJ9FH8WSkLFGtfZdbHOZwqAR4tkt2ugknzQh:mCmGZE9FH8JcFGtR5tZR4it2uNnze

Malware Config

Targets

    • Target

      b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e

    • Size

      4.8MB

    • MD5

      192f74c4eb3a499b12d19184de60d5b1

    • SHA1

      764dcd8cbeb93bbc06c040e2b1afe625fc5b07e2

    • SHA256

      b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e

    • SHA512

      975fa7be617ce1672c081e0010a20124ea255178aa56f2ff708451e02ee6c72fa6bb38a324d7c488d1725b2849fdfcaa6d0c3c241a2375271bef212ad0da5e3b

    • SSDEEP

      98304:T8DpgICmUlkWKJ9FH8WSkLFGtfZdbHOZwqAR4tkt2ugknzQh:mCmGZE9FH8JcFGtR5tZR4it2uNnze

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks