General

  • Target

    BLTools V2.0.0.exe

  • Size

    7.4MB

  • Sample

    240416-a8a98sch87

  • MD5

    1a8902cd60c38c8e2f0e752d45627dd9

  • SHA1

    3e5767b0243ff466ba6db2974e4a87a295419cd4

  • SHA256

    5c5f543002e61369b783a15a504231dc794359c41c0054655f04a3596e6124d8

  • SHA512

    0951af3fe1c76e3b34b39a9f9b6d419896dfcb14f004646b769d8171cbe57aa2661d595dce35b9da31d9e509e190f00fa0e08c712ed422b98f0848cb11a64a45

  • SSDEEP

    196608:7dg6mgSSRoyMU48mrvL/m9jmAD8SQQ6DIxp:XayR48SviwUyDIxp

Malware Config

Targets

    • Target

      BLTools V2.0.0.exe

    • Size

      7.4MB

    • MD5

      1a8902cd60c38c8e2f0e752d45627dd9

    • SHA1

      3e5767b0243ff466ba6db2974e4a87a295419cd4

    • SHA256

      5c5f543002e61369b783a15a504231dc794359c41c0054655f04a3596e6124d8

    • SHA512

      0951af3fe1c76e3b34b39a9f9b6d419896dfcb14f004646b769d8171cbe57aa2661d595dce35b9da31d9e509e190f00fa0e08c712ed422b98f0848cb11a64a45

    • SSDEEP

      196608:7dg6mgSSRoyMU48mrvL/m9jmAD8SQQ6DIxp:XayR48SviwUyDIxp

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • UAC bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks