General

  • Target

    Loader.exe

  • Size

    3.4MB

  • Sample

    240522-fn3fwacf68

  • MD5

    31718a8cc11d08a8d32292ce022b67e0

  • SHA1

    6714f288d498562f8dbb8e3a2e9ee3d20d71c658

  • SHA256

    66c3dd691e89e216bae7b3dd20598b80469bd868267183eb21acab5a563a4ea9

  • SHA512

    477651c024c4bb3f364cc1fff28382fb5b33ac76d1c138e31846ce3afcd602d40014ab622bbf6418a69075311d76aed52c72fee90bbedbdf15b85859e75329a2

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxNL9bzjEj+O93+xr:Mxx9NUFkQx753uWuCyyxXOru9

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      3.4MB

    • MD5

      31718a8cc11d08a8d32292ce022b67e0

    • SHA1

      6714f288d498562f8dbb8e3a2e9ee3d20d71c658

    • SHA256

      66c3dd691e89e216bae7b3dd20598b80469bd868267183eb21acab5a563a4ea9

    • SHA512

      477651c024c4bb3f364cc1fff28382fb5b33ac76d1c138e31846ce3afcd602d40014ab622bbf6418a69075311d76aed52c72fee90bbedbdf15b85859e75329a2

    • SSDEEP

      49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxNL9bzjEj+O93+xr:Mxx9NUFkQx753uWuCyyxXOru9

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks