General

  • Target

    89a2cf3f42ccf919d224c04120d83a14769ae50f59a2e181f766a104a98b1590

  • Size

    2.5MB

  • Sample

    240522-c5kevahh4s

  • MD5

    5480cdaf397ec7d51489a1ec48df429c

  • SHA1

    039322ecdb08371144a76ca9e38f51aa0bfec024

  • SHA256

    89a2cf3f42ccf919d224c04120d83a14769ae50f59a2e181f766a104a98b1590

  • SHA512

    3854b8cbb812ce17c1510efa3ea5ff58322d932060dc8e5c1b863d0bdbe0882af53f42af46ccb443dab14ee031ffa86c401c7bc2e66904ef080b6771480f9b63

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxS:Mxx9NUFkQx753uWuCyyxS

Malware Config

Targets

    • Target

      89a2cf3f42ccf919d224c04120d83a14769ae50f59a2e181f766a104a98b1590

    • Size

      2.5MB

    • MD5

      5480cdaf397ec7d51489a1ec48df429c

    • SHA1

      039322ecdb08371144a76ca9e38f51aa0bfec024

    • SHA256

      89a2cf3f42ccf919d224c04120d83a14769ae50f59a2e181f766a104a98b1590

    • SHA512

      3854b8cbb812ce17c1510efa3ea5ff58322d932060dc8e5c1b863d0bdbe0882af53f42af46ccb443dab14ee031ffa86c401c7bc2e66904ef080b6771480f9b63

    • SSDEEP

      49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxS:Mxx9NUFkQx753uWuCyyxS

    • Modifies visiblity of hidden/system files in Explorer

    • Detects executables packed with Themida

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks