General

  • Target

    c7e14c804236547344b4413772a9ad33

  • Size

    4.8MB

  • Sample

    240314-gwqbysef77

  • MD5

    c7e14c804236547344b4413772a9ad33

  • SHA1

    fb3ebcc5190546eec00862ffd27578859815ce19

  • SHA256

    3e8ee46d70469f4353957fd0b2794dde304d7ec67b0797a7612105a9d77c87e1

  • SHA512

    c23f06a0be9fca583966875f79b41059a07577a5b9e28527b27d5929dcdb206a64ed4ccd8d187f3dd9ad9b08416d998ef94d1e75420163eeec85af350403c78d

  • SSDEEP

    98304:57b6GmrAgijyayMUwGxdLlYFAMp6rEfj6aZw9J4OiAs6YXxV:BgcJIIjhIYL

Malware Config

Targets

    • Target

      c7e14c804236547344b4413772a9ad33

    • Size

      4.8MB

    • MD5

      c7e14c804236547344b4413772a9ad33

    • SHA1

      fb3ebcc5190546eec00862ffd27578859815ce19

    • SHA256

      3e8ee46d70469f4353957fd0b2794dde304d7ec67b0797a7612105a9d77c87e1

    • SHA512

      c23f06a0be9fca583966875f79b41059a07577a5b9e28527b27d5929dcdb206a64ed4ccd8d187f3dd9ad9b08416d998ef94d1e75420163eeec85af350403c78d

    • SSDEEP

      98304:57b6GmrAgijyayMUwGxdLlYFAMp6rEfj6aZw9J4OiAs6YXxV:BgcJIIjhIYL

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks