General

  • Target

    8169672f78da3db3ed6f2da6581d6730bf55197cb703fa96fb98408b02dc5403

  • Size

    3.3MB

  • Sample

    240524-cl189ahg23

  • MD5

    19e3cbfb7e26ddca6332bbcd62f5d78c

  • SHA1

    67eb601047ccb6ba96de875a2326fe55da2f1dc2

  • SHA256

    8169672f78da3db3ed6f2da6581d6730bf55197cb703fa96fb98408b02dc5403

  • SHA512

    e18d1f824a2e7ad783e79a2db1e398a4a48d37f60d1f82d73f6b65ed70c98c0cdd6e605423453d6d05512aa0e2afbf77680758409d18d3cb0382f646d62b8769

  • SSDEEP

    98304:3QOH5raT1GoHKqUifIwY/L4a3X62BcFOg/9MRhM6+baj:nHcBHKqUaS/LO2BM9MDMF

Malware Config

Targets

    • Target

      8169672f78da3db3ed6f2da6581d6730bf55197cb703fa96fb98408b02dc5403

    • Size

      3.3MB

    • MD5

      19e3cbfb7e26ddca6332bbcd62f5d78c

    • SHA1

      67eb601047ccb6ba96de875a2326fe55da2f1dc2

    • SHA256

      8169672f78da3db3ed6f2da6581d6730bf55197cb703fa96fb98408b02dc5403

    • SHA512

      e18d1f824a2e7ad783e79a2db1e398a4a48d37f60d1f82d73f6b65ed70c98c0cdd6e605423453d6d05512aa0e2afbf77680758409d18d3cb0382f646d62b8769

    • SSDEEP

      98304:3QOH5raT1GoHKqUifIwY/L4a3X62BcFOg/9MRhM6+baj:nHcBHKqUaS/LO2BM9MDMF

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks