General

  • Target

    hahahahahahahahahahahahah.rar

  • Size

    4.3MB

  • Sample

    240127-2te4esfgbl

  • MD5

    0323f2c7b7af87677efd63e31b57da08

  • SHA1

    adab7f004d05a27d7b4e996e6bfe5c83d2f0812d

  • SHA256

    099d621cb537bd7465a136f5021b7ea8b958fe26ad9b8c743bd0a2ec80d9e0bd

  • SHA512

    330a3281384ca7d1cc631eb0d197e91d4fb6ef4d5811323d114133a416a95f17b421d8c53946c110826633ce8301256a8d7356242182a19670ce46a02c092ad1

  • SSDEEP

    98304:yjw2RfT7iAQrMyvMKDgLrlx0sC82hePK/6vFmIFwAi2NFhuVu:yTfviNhcLZx0sChlEmIe+NFww

Malware Config

Targets

    • Target

      login.exe

    • Size

      429KB

    • MD5

      b88444cf2c03ce4efe2a1608a379ee53

    • SHA1

      68d9285ee72288656c258cf9db9c564226a48ddb

    • SHA256

      d70e292a21ebc5ca1675ca585bcae52a51aad4bcee9bbbaf44b0a2cc635b64c7

    • SHA512

      7c9e116a417f2a15d2ca3f70b61697c9e34b6131b12221032cde9d64c41993f6f8cfa34196ed99122aa34d59159955d6362827f0d4eee1688bce465539e8d633

    • SSDEEP

      12288:Zt5NpMGK6Ia5Jr4IQAvq3eSKXvVZhuwxHvh:Zt5NGGzIo3QSqOS+VZhT

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks