General

  • Target

    BTC PROFIT SEARCH AND MINING PHRASES.zip

  • Size

    31.5MB

  • Sample

    240221-v93fbscd61

  • MD5

    69af5f7662909a90330ba45f04c3804c

  • SHA1

    a27d695dbd0d73fe7e780fcd38c95707f9918fc5

  • SHA256

    1566c8accabd62f97e2938e1479cffcf944c6f65f07665763fc53c243771795f

  • SHA512

    260285144af17bf8b0d49c98ffd8adffc35a55a7cc0cd993b531708d1ba9e1a54db75e837297dd8e5ce55aad0901977baaf4a39bb17651e41e0e965aa4f31b02

  • SSDEEP

    393216:toCgpQOM5p11WFs87W+K5apvFagzEHfWA/flO4tHbtlW51CUcyGpq+5WVTNvsD+x:CKOM5p1as87Lcap74OCQUZlWCiQGWD0

Malware Config

Targets

    • Target

      BTC PROFIT SEARCH AND MINING PHRASES.exe

    • Size

      38.0MB

    • MD5

      3b88db99494aab72d7ac7c2d07055f7f

    • SHA1

      b24b239f4a3fc27a2585591ccefe3bbb0260d973

    • SHA256

      9674a91f5ce59ed183e9c63e75db9a2b7d87cae36de8c8a984099e5541a1f797

    • SHA512

      a976ca3b6f0fcb01161654381f0058fc9c268ecedaeacb855aca9a9580ff7c25e4b2178b2cc5807b9611de2b5f4529136e49491c41124db4e068abddf87500b9

    • SSDEEP

      786432:P/wp7Q6Otq9xNYNl1/hiaU+6SW3AZmSJhwTwZ:P/8ElX3g/T

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks