General

  • Target

    8f9a5e9697b233ba78fd404d6d49479ae4f56d554da3df9a6f4caaa89907d290

  • Size

    2.6MB

  • Sample

    240425-aq84jscb75

  • MD5

    067c7134aed0a7c2e19d36073ce306cc

  • SHA1

    7831e3707b625ca345fe2c1f24661a2ad0358a18

  • SHA256

    8f9a5e9697b233ba78fd404d6d49479ae4f56d554da3df9a6f4caaa89907d290

  • SHA512

    a234db97afd56d5dc9a6f41ffe2ff19ddfb34dcdfd5caf44afe0ae5fc98bf89cc6a15052715d9d3497a9a1eefe6614b8c242535c72025c80d2b61b9b0feb1bdd

  • SSDEEP

    49152:fXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVg:fXzhW148Pd+Tf1mpcOldJQ3/Vg

Malware Config

Targets

    • Target

      8f9a5e9697b233ba78fd404d6d49479ae4f56d554da3df9a6f4caaa89907d290

    • Size

      2.6MB

    • MD5

      067c7134aed0a7c2e19d36073ce306cc

    • SHA1

      7831e3707b625ca345fe2c1f24661a2ad0358a18

    • SHA256

      8f9a5e9697b233ba78fd404d6d49479ae4f56d554da3df9a6f4caaa89907d290

    • SHA512

      a234db97afd56d5dc9a6f41ffe2ff19ddfb34dcdfd5caf44afe0ae5fc98bf89cc6a15052715d9d3497a9a1eefe6614b8c242535c72025c80d2b61b9b0feb1bdd

    • SSDEEP

      49152:fXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVg:fXzhW148Pd+Tf1mpcOldJQ3/Vg

    • Modifies visiblity of hidden/system files in Explorer

    • Detects executables packed with Themida

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks