General

  • Target

    Unlocker_2.exe

  • Size

    3.4MB

  • Sample

    240522-fwh27sdb8v

  • MD5

    9b25d73c3a94e37f07fd23154e004c8b

  • SHA1

    8ef59559d03711ca7f2185e98039aecdb11e6162

  • SHA256

    e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226

  • SHA512

    c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ

Malware Config

Targets

    • Target

      Unlocker_2.exe

    • Size

      3.4MB

    • MD5

      9b25d73c3a94e37f07fd23154e004c8b

    • SHA1

      8ef59559d03711ca7f2185e98039aecdb11e6162

    • SHA256

      e65c8c69d128676f200db5ae91937aa4152fd93fb66e8098972ce33f3f029226

    • SHA512

      c5c3cd962290dff48cdadf98e249577c762bac978dc138fd1e9fc00ea02e504e0f632a6b04db56f3d0224a3a8cdf0ba12ead2983d52c9ecde354f75eae717e92

    • SSDEEP

      49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxj3GT0DZ8oNZ+O93+xaj:Mxx9NUFkQx753uWuCyyxaCruQ

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks