General

  • Target

    ssz_mwiii_cheat.exe

  • Size

    5.1MB

  • Sample

    240224-ja4zbsea4s

  • MD5

    dba6ac156bfa93bbcacabfca8c970623

  • SHA1

    00b5b9f7e51a89a3636bf81c1a0fa86242dcde6b

  • SHA256

    018622f3638242d442d571090cd23475890f54e94d46b2985c16d44d242dc69d

  • SHA512

    1d93e89e67d60cfca1cf5eb32a7a94009b7c6c77a828da39684a22f79e40acf88dbe24853ee8a7c701bb75d8d0ef731622ca2ea834cf11fb81a62afd9091d0af

  • SSDEEP

    98304:sHIUk7k4hPQIrJHMZnFtTtQ4cJTfK7BairIFVFhDDURkXz3awXB1B6l6:f737rJHsFt5QtxK7B/YUKj3vR26

Malware Config

Targets

    • Target

      ssz_mwiii_cheat.exe

    • Size

      5.1MB

    • MD5

      dba6ac156bfa93bbcacabfca8c970623

    • SHA1

      00b5b9f7e51a89a3636bf81c1a0fa86242dcde6b

    • SHA256

      018622f3638242d442d571090cd23475890f54e94d46b2985c16d44d242dc69d

    • SHA512

      1d93e89e67d60cfca1cf5eb32a7a94009b7c6c77a828da39684a22f79e40acf88dbe24853ee8a7c701bb75d8d0ef731622ca2ea834cf11fb81a62afd9091d0af

    • SSDEEP

      98304:sHIUk7k4hPQIrJHMZnFtTtQ4cJTfK7BairIFVFhDDURkXz3awXB1B6l6:f737rJHsFt5QtxK7B/YUKj3vR26

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks