General

  • Target

    2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9.zip

  • Size

    5.3MB

  • Sample

    240506-hmjcqacf3v

  • MD5

    fdd2ab31f489385c0234bf0da7a8d2e1

  • SHA1

    0537b6d52daccee17715be83c4b16d10080838e5

  • SHA256

    34392a29c9d024a79bb62977a79fcc1d6bbc611aa7001be19105620d2225d39e

  • SHA512

    db1e8cb8680bcf2f35796ffe8c9d24109a514a95f43169a617c7d9e1e24a951e9aa824a215414e5e497b5be80165f92e3c71f297e4f2bc1bdebaef64905d9279

  • SSDEEP

    98304:i6WngARM3untzZkOR6LwTzhI8qyM9aWAgCRI1aq3pTPg+c1SE2U7ZzRQTrOQ:/WgpuntFkOR6ezO84aWKRIh5TPgHh37m

Malware Config

Targets

    • Target

      2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9

    • Size

      5.3MB

    • MD5

      11380a723c10152e806742510f6aa79c

    • SHA1

      0a7ed414ae9a6442ab4830a6d35a531e408eb530

    • SHA256

      2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9

    • SHA512

      2196909b5922a2e319287aea910d15d74d923537bf54ea6cab102674b68a932d781c9cd2f6f051a8995f4ef9df0c098e9cff1c9e6a2a8c4271aa48efe6df4501

    • SSDEEP

      98304:bLrhcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qo:vVg53HRVu7vHDpS1IqBRU7kCs2q

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Detect suspicious telegram bot

      Detect suspicious telegram bot.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks