Resubmissions

05-03-2024 23:31

240305-3hsqtace5s 10

05-03-2024 18:08

240305-wq4dysdc2y 10

General

  • Target

    StatesFenceStatutesTennessee.exe

  • Size

    327.7MB

  • Sample

    240305-3hsqtace5s

  • MD5

    7e25fdb1932480e3e6ec31b22d08c19e

  • SHA1

    0dfca2e6c1c89b1e85fdbb9da31a93964db7b826

  • SHA256

    fbef401c6a7ad24640f6b6583aa0d0fa02aa895c47ab08e68b0e6e312d1b42a5

  • SHA512

    2bb81a8ddda7ef4bbc9508c7c80f56b5a00215674ad38e442937c42a2ecdf4e827b906b97bf63c67c36dd0a7ef78d2c6b5b6202d96516ece8b5d2dbd355f8326

  • SSDEEP

    196608:99GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDf:9kYVI5DK2NNs6LtYdEhSpz

Malware Config

Targets

    • Target

      StatesFenceStatutesTennessee.exe

    • Size

      327.7MB

    • MD5

      7e25fdb1932480e3e6ec31b22d08c19e

    • SHA1

      0dfca2e6c1c89b1e85fdbb9da31a93964db7b826

    • SHA256

      fbef401c6a7ad24640f6b6583aa0d0fa02aa895c47ab08e68b0e6e312d1b42a5

    • SHA512

      2bb81a8ddda7ef4bbc9508c7c80f56b5a00215674ad38e442937c42a2ecdf4e827b906b97bf63c67c36dd0a7ef78d2c6b5b6202d96516ece8b5d2dbd355f8326

    • SSDEEP

      196608:99GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDf:9kYVI5DK2NNs6LtYdEhSpz

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks