General

  • Target

    5a794c0c67a540f523c4c26f7fbdda53f6b2a33b4f14b615cd2ca01e8a28689d

  • Size

    10.8MB

  • Sample

    240521-rp15zsgh74

  • MD5

    be159718a0d9bfbaa0d48b3830fbd3ff

  • SHA1

    bc943b130fc9da980bb4f2e84dc96c77981dd3ed

  • SHA256

    5a794c0c67a540f523c4c26f7fbdda53f6b2a33b4f14b615cd2ca01e8a28689d

  • SHA512

    4a965089dc4acae418d1e23c506f44913f1df72721c7c292d30cfb441a3b700fe861e1be78d187ca39192ffd82bc055ba1d7594df60b200bf839f0c761d16bf2

  • SSDEEP

    196608:sVMMOU6/a70XSNEBeK1pjXQWzkEQWto5OzoEA1UsRARcV7igwXqHYjl:lMOU6yOBeo43V7igkqHYR

Malware Config

Targets

    • Target

      5a794c0c67a540f523c4c26f7fbdda53f6b2a33b4f14b615cd2ca01e8a28689d

    • Size

      10.8MB

    • MD5

      be159718a0d9bfbaa0d48b3830fbd3ff

    • SHA1

      bc943b130fc9da980bb4f2e84dc96c77981dd3ed

    • SHA256

      5a794c0c67a540f523c4c26f7fbdda53f6b2a33b4f14b615cd2ca01e8a28689d

    • SHA512

      4a965089dc4acae418d1e23c506f44913f1df72721c7c292d30cfb441a3b700fe861e1be78d187ca39192ffd82bc055ba1d7594df60b200bf839f0c761d16bf2

    • SSDEEP

      196608:sVMMOU6/a70XSNEBeK1pjXQWzkEQWto5OzoEA1UsRARcV7igwXqHYjl:lMOU6yOBeo43V7igkqHYR

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks