General

  • Target

    d8a977071676464fe8d540d72fc99acf

  • Size

    6.9MB

  • Sample

    240320-nce57sfc78

  • MD5

    d8a977071676464fe8d540d72fc99acf

  • SHA1

    0f6e3e5023469f58c190e1c8563b95de87ea65b4

  • SHA256

    b44304c86c1ed108574eab57a316b72d2602e473be5fcbff69fd4c8b067eb452

  • SHA512

    66ac4b77e393340efa0d6155a0da50c876c8af50d883cbc9261dd26a6894aa2db74993f62f8aa7ae49177332949025b4c6efe863d5035291c5d148ff002a8cee

  • SSDEEP

    196608:SHEJHZ/eTq1Gftof7bIj9yHyCkZZV5v/n1rS+slCCmFK:VpPGfiUTTBc+ymY

Malware Config

Targets

    • Target

      d8a977071676464fe8d540d72fc99acf

    • Size

      6.9MB

    • MD5

      d8a977071676464fe8d540d72fc99acf

    • SHA1

      0f6e3e5023469f58c190e1c8563b95de87ea65b4

    • SHA256

      b44304c86c1ed108574eab57a316b72d2602e473be5fcbff69fd4c8b067eb452

    • SHA512

      66ac4b77e393340efa0d6155a0da50c876c8af50d883cbc9261dd26a6894aa2db74993f62f8aa7ae49177332949025b4c6efe863d5035291c5d148ff002a8cee

    • SSDEEP

      196608:SHEJHZ/eTq1Gftof7bIj9yHyCkZZV5v/n1rS+slCCmFK:VpPGfiUTTBc+ymY

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks