General

  • Target

    Chaos.exe

  • Size

    14.1MB

  • Sample

    240417-gesezsfa87

  • MD5

    f61508697803a88cbf0b756205ffc0f2

  • SHA1

    8cf624715c229f97219b547714b169b70b97ac05

  • SHA256

    df1f34ac1c1af712043724d66d7f61ddcfdd6ba7be2d01f575184ff5a2e9d597

  • SHA512

    b39224f2b14d6291f8ddd379de16294ad519c8723ba2a481e24c73144ff9326cc8291a71d1ad85511a5acbfc2fd9ec68724d8da193a3b7f53f3cb31d802f597a

  • SSDEEP

    393216:If1481FuQ4vmIabiV9YQ8gtA3TqDFsL92UWc:c4guvmIabyv2+D3UF

Malware Config

Targets

    • Target

      Chaos.exe

    • Size

      14.1MB

    • MD5

      f61508697803a88cbf0b756205ffc0f2

    • SHA1

      8cf624715c229f97219b547714b169b70b97ac05

    • SHA256

      df1f34ac1c1af712043724d66d7f61ddcfdd6ba7be2d01f575184ff5a2e9d597

    • SHA512

      b39224f2b14d6291f8ddd379de16294ad519c8723ba2a481e24c73144ff9326cc8291a71d1ad85511a5acbfc2fd9ec68724d8da193a3b7f53f3cb31d802f597a

    • SSDEEP

      393216:If1481FuQ4vmIabiV9YQ8gtA3TqDFsL92UWc:c4guvmIabyv2+D3UF

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks