General
-
Target
data1.sfx.bin
-
Size
250.0MB
-
Sample
240426-p6ay1scg8w
-
MD5
1672d51cae4b86fadff4745816f4d2a0
-
SHA1
2c55f18d84deb5eca663118f1c53f2a0453c0308
-
SHA256
b7dd9fe69c8b2431087329eb78c9fb1bdbcb511194aae0a42238cce026505b6e
-
SHA512
8889bb4a303040eaee03cd1ed2848e861a854fd0105f6fa6eb28b86344e2e310af7d6d7a08d8c2fe2fd6bfc5bf8db5b48d505245bc52ef650e3ddb4e1fa06fb2
-
SSDEEP
6291456:b2VJrlgKMQ8U7eXi4mpmtXN5/hkSnAx7MWKDZ1MqOjtC778geXeM0Q:2lmKMqvpCNBhJ1F1MqOjtk7Ox
Static task
static1
Malware Config
Targets
-
-
Target
data1.sfx.bin
-
Size
250.0MB
-
MD5
1672d51cae4b86fadff4745816f4d2a0
-
SHA1
2c55f18d84deb5eca663118f1c53f2a0453c0308
-
SHA256
b7dd9fe69c8b2431087329eb78c9fb1bdbcb511194aae0a42238cce026505b6e
-
SHA512
8889bb4a303040eaee03cd1ed2848e861a854fd0105f6fa6eb28b86344e2e310af7d6d7a08d8c2fe2fd6bfc5bf8db5b48d505245bc52ef650e3ddb4e1fa06fb2
-
SSDEEP
6291456:b2VJrlgKMQ8U7eXi4mpmtXN5/hkSnAx7MWKDZ1MqOjtC778geXeM0Q:2lmKMqvpCNBhJ1F1MqOjtk7Ox
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Virtualization/Sandbox Evasion
1