General

  • Target

    b5202d628db8cfafc603777784ef13414539f1a130c1c64ee4011ebb832e98b3

  • Size

    4.8MB

  • Sample

    240524-ecr1bsbh5z

  • MD5

    96984647d7466fa9f65854603b1e99dc

  • SHA1

    6253db55496c5f9ad9fc8c4ad38b5184cc648cd8

  • SHA256

    b5202d628db8cfafc603777784ef13414539f1a130c1c64ee4011ebb832e98b3

  • SHA512

    722474246fd4133d9d9e68b8474e10c1f94636b81e30766e992e3e7c9ad60a86da7ab8b52caf4a7991170099061cbcf21e52fc9d92a693b2d2c1f779fbee16c7

  • SSDEEP

    98304:efQMgb1ycVEYAyts9YmTZbHDMviI1ALK/TTwfxxX3bT89zmqerxxl:6g4cVXtWIFl/HaXXH8Zmqmx

Malware Config

Targets

    • Target

      b5202d628db8cfafc603777784ef13414539f1a130c1c64ee4011ebb832e98b3

    • Size

      4.8MB

    • MD5

      96984647d7466fa9f65854603b1e99dc

    • SHA1

      6253db55496c5f9ad9fc8c4ad38b5184cc648cd8

    • SHA256

      b5202d628db8cfafc603777784ef13414539f1a130c1c64ee4011ebb832e98b3

    • SHA512

      722474246fd4133d9d9e68b8474e10c1f94636b81e30766e992e3e7c9ad60a86da7ab8b52caf4a7991170099061cbcf21e52fc9d92a693b2d2c1f779fbee16c7

    • SSDEEP

      98304:efQMgb1ycVEYAyts9YmTZbHDMviI1ALK/TTwfxxX3bT89zmqerxxl:6g4cVXtWIFl/HaXXH8Zmqmx

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks