General

  • Target

    ec6cf050ee7420ccc203d18a9722ce1b91fde420f8f5bdd910e6e8249b24ea2a

  • Size

    2.5MB

  • Sample

    240425-fj5ensfh4y

  • MD5

    a0c2cbd2e887292eca9c2daebabbf272

  • SHA1

    402d091fe7ad8e0fd2a9bdea25dc6ad0dc7c5430

  • SHA256

    ec6cf050ee7420ccc203d18a9722ce1b91fde420f8f5bdd910e6e8249b24ea2a

  • SHA512

    02113dae7ed2c70673fd3c82ba7bc269a3e54e99639250eaa463353c92d34e2c524e85680b0fb98cedcc44f529f98395fde8755c0cfe2044a9c0b7257606494e

  • SSDEEP

    49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxa:hxx9NUFkQx753uWuCyyxa

Malware Config

Targets

    • Target

      ec6cf050ee7420ccc203d18a9722ce1b91fde420f8f5bdd910e6e8249b24ea2a

    • Size

      2.5MB

    • MD5

      a0c2cbd2e887292eca9c2daebabbf272

    • SHA1

      402d091fe7ad8e0fd2a9bdea25dc6ad0dc7c5430

    • SHA256

      ec6cf050ee7420ccc203d18a9722ce1b91fde420f8f5bdd910e6e8249b24ea2a

    • SHA512

      02113dae7ed2c70673fd3c82ba7bc269a3e54e99639250eaa463353c92d34e2c524e85680b0fb98cedcc44f529f98395fde8755c0cfe2044a9c0b7257606494e

    • SSDEEP

      49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxa:hxx9NUFkQx753uWuCyyxa

    • Modifies visiblity of hidden/system files in Explorer

    • Detects executables packed with Themida

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks