General

  • Target

    file.exe

  • Size

    4.7MB

  • Sample

    240218-m1nxkshb2s

  • MD5

    eaa10ae5c43bc3acf4245b22d4b70050

  • SHA1

    d6a2598daee7c5db8398915b0736953060dbca39

  • SHA256

    bfbb67a72c2e129b59e06ab2e5ac44b712bbc90f030236a8ee2a47ae90717755

  • SHA512

    13b01f7c79409967db6350a5c007af4f764721482be730b26d9482c042fb2bbea72dd0ef963ca8ffe0be405661b3e2f5e7dc3b726b75d9b27021693c20be58bf

  • SSDEEP

    49152:brcrVzPIkVly+g20eZJ6qA/9JtYdMP+tL9Cpf9PTIkKgwWyst/lEzAzSgzsvtsop:bkRI6WeZJ6jxRqO4gwgY+SgYKgTBOW

Malware Config

Targets

    • Target

      file.exe

    • Size

      4.7MB

    • MD5

      eaa10ae5c43bc3acf4245b22d4b70050

    • SHA1

      d6a2598daee7c5db8398915b0736953060dbca39

    • SHA256

      bfbb67a72c2e129b59e06ab2e5ac44b712bbc90f030236a8ee2a47ae90717755

    • SHA512

      13b01f7c79409967db6350a5c007af4f764721482be730b26d9482c042fb2bbea72dd0ef963ca8ffe0be405661b3e2f5e7dc3b726b75d9b27021693c20be58bf

    • SSDEEP

      49152:brcrVzPIkVly+g20eZJ6qA/9JtYdMP+tL9Cpf9PTIkKgwWyst/lEzAzSgzsvtsop:bkRI6WeZJ6jxRqO4gwgY+SgYKgTBOW

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks