General

  • Target

    996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1

  • Size

    12.3MB

  • Sample

    240523-fmwlyaee76

  • MD5

    294e8b28cb6d1ff9e57d4f82d696b800

  • SHA1

    b205734e67213dc440f47786e51029dfb0ddf6bc

  • SHA256

    996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1

  • SHA512

    7d21a1715f16ed290149c13d89e553e47e11e54a57b474091cf9b8858383649511f2f3fece8014f1322c7982b3c0b2166bcd767644b913490c525954faeeecc5

  • SSDEEP

    393216:ymtxYM6QuPQDYhB3lijQyhAY/TxhsMf2Ky4OAvIp:fOM6pYDWDaQyhAY7Ic2KKT

Malware Config

Targets

    • Target

      996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1

    • Size

      12.3MB

    • MD5

      294e8b28cb6d1ff9e57d4f82d696b800

    • SHA1

      b205734e67213dc440f47786e51029dfb0ddf6bc

    • SHA256

      996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1

    • SHA512

      7d21a1715f16ed290149c13d89e553e47e11e54a57b474091cf9b8858383649511f2f3fece8014f1322c7982b3c0b2166bcd767644b913490c525954faeeecc5

    • SSDEEP

      393216:ymtxYM6QuPQDYhB3lijQyhAY/TxhsMf2Ky4OAvIp:fOM6pYDWDaQyhAY7Ic2KKT

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks