General

  • Target

    Electron

  • Size

    14KB

  • Sample

    240312-mp7wbaeh5y

  • MD5

    0dcf64dc0f873b1d5cb1976800bc4f45

  • SHA1

    b254cf4c964db79806a9315684ce81eeb1341f7c

  • SHA256

    10ab7cb1f689ec859be78ee02b4314b3300e490d566ee7e3ca2148dd68b56690

  • SHA512

    62ef61a544c4b208ff1bfb8dcf007376f37a064482c77afd2c515719787ba416ad903bf9d06afea8b514d8f0581beda340cc4499fafaf29f9bc8c9bfd26d97a9

  • SSDEEP

    384:ve9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSiZ7AH:vwTilUlC9fvOflS5/u01/8xWApJingq/

Score
9/10

Malware Config

Targets

    • Target

      Electron

    • Size

      14KB

    • MD5

      0dcf64dc0f873b1d5cb1976800bc4f45

    • SHA1

      b254cf4c964db79806a9315684ce81eeb1341f7c

    • SHA256

      10ab7cb1f689ec859be78ee02b4314b3300e490d566ee7e3ca2148dd68b56690

    • SHA512

      62ef61a544c4b208ff1bfb8dcf007376f37a064482c77afd2c515719787ba416ad903bf9d06afea8b514d8f0581beda340cc4499fafaf29f9bc8c9bfd26d97a9

    • SSDEEP

      384:ve9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSiZ7AH:vwTilUlC9fvOflS5/u01/8xWApJingq/

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks