General

  • Target

    file.exe

  • Size

    6.4MB

  • Sample

    240214-wn623ahe4z

  • MD5

    645e8693d7b547526c7b2269521d87a9

  • SHA1

    bb073ccda2d61405f5e68917fc78d7e54839561a

  • SHA256

    0c2f0b304f7c7ff46ce7ea4480b6fdc37bdabf9b98e0152f68fc787e8872023b

  • SHA512

    27ae0ff3a291728bb0b47bb207f358f114434f118d5e104ce009f99287ffc2b0e4d44e5ef86ce7eb42eaca47bed72cb15a600f5a087c1ef997e5fdf76eec0a02

  • SSDEEP

    98304:8lppo/C4Qtv9vScvqUISTD3AXRPU9sg+8igFkgw+mE6qDnHh+A/lM3ytWd7eY+1N:8pP48BZ+8iYkgwh/qLzS3JhKuKZ

Malware Config

Targets

    • Target

      file.exe

    • Size

      6.4MB

    • MD5

      645e8693d7b547526c7b2269521d87a9

    • SHA1

      bb073ccda2d61405f5e68917fc78d7e54839561a

    • SHA256

      0c2f0b304f7c7ff46ce7ea4480b6fdc37bdabf9b98e0152f68fc787e8872023b

    • SHA512

      27ae0ff3a291728bb0b47bb207f358f114434f118d5e104ce009f99287ffc2b0e4d44e5ef86ce7eb42eaca47bed72cb15a600f5a087c1ef997e5fdf76eec0a02

    • SSDEEP

      98304:8lppo/C4Qtv9vScvqUISTD3AXRPU9sg+8igFkgw+mE6qDnHh+A/lM3ytWd7eY+1N:8pP48BZ+8iYkgwh/qLzS3JhKuKZ

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks