General

  • Target

    a2bd5f6928a43390e15a98f50fec38a4

  • Size

    2.6MB

  • Sample

    240224-zsep6afb9t

  • MD5

    a2bd5f6928a43390e15a98f50fec38a4

  • SHA1

    0e8ee7f73a73b6ab796f054a599bd34312bbac7d

  • SHA256

    aa7c8ce796f88ec14958725112e7f9457f9280fd9d728066e70fd33bd124659e

  • SHA512

    5998701317c3687fdf57f8701d8d77e2e764b805b5f17e25721936ae4bba6c1715e437fd203a1eab8bf92b139d1bffb0b1f3005633cd426061abfa43d5a9e9aa

  • SSDEEP

    49152:tU/5M1X4Wl/YvzYCQR9RQs+C40yZpJaD99G5:tKq4oEa9RQs+Cn4/UK5

Malware Config

Targets

    • Target

      a2bd5f6928a43390e15a98f50fec38a4

    • Size

      2.6MB

    • MD5

      a2bd5f6928a43390e15a98f50fec38a4

    • SHA1

      0e8ee7f73a73b6ab796f054a599bd34312bbac7d

    • SHA256

      aa7c8ce796f88ec14958725112e7f9457f9280fd9d728066e70fd33bd124659e

    • SHA512

      5998701317c3687fdf57f8701d8d77e2e764b805b5f17e25721936ae4bba6c1715e437fd203a1eab8bf92b139d1bffb0b1f3005633cd426061abfa43d5a9e9aa

    • SSDEEP

      49152:tU/5M1X4Wl/YvzYCQR9RQs+C40yZpJaD99G5:tKq4oEa9RQs+Cn4/UK5

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks