Resubmissions

22/02/2024, 23:22

240222-3cjwqagg57 9

22/02/2024, 04:22

240222-ezg4mscb57 9

General

  • Target

    celexware! (1).exe

  • Size

    4.0MB

  • Sample

    240222-3cjwqagg57

  • MD5

    e0f791ee5ec8fbc02d0d50730bbe54ce

  • SHA1

    79e26ea4cbef52244855082bdce86f65aa2da00f

  • SHA256

    e919724919f29ea9728aa7aca9695f14fb28c48a00bb7928d216e5e9807c34ce

  • SHA512

    2fe2af1cb954cad00a5e73f343f257dc24031feb3891594177d19d2ed5ca9c68b2bcf2dc220f5ca4ef4014138aaad3befa0e57de8b55a84395bb3a8306501834

  • SSDEEP

    98304:TRauJx7Uw8ZAJBPVKC6FBCcl9R9yEyiVRaK+TkA56KLwxI:kaUw5MYcl9PtyE+ghI

Malware Config

Targets

    • Target

      celexware! (1).exe

    • Size

      4.0MB

    • MD5

      e0f791ee5ec8fbc02d0d50730bbe54ce

    • SHA1

      79e26ea4cbef52244855082bdce86f65aa2da00f

    • SHA256

      e919724919f29ea9728aa7aca9695f14fb28c48a00bb7928d216e5e9807c34ce

    • SHA512

      2fe2af1cb954cad00a5e73f343f257dc24031feb3891594177d19d2ed5ca9c68b2bcf2dc220f5ca4ef4014138aaad3befa0e57de8b55a84395bb3a8306501834

    • SSDEEP

      98304:TRauJx7Uw8ZAJBPVKC6FBCcl9R9yEyiVRaK+TkA56KLwxI:kaUw5MYcl9PtyE+ghI

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks