General

  • Target

    92105da09cc48e4f81bdfe124904bef025ee94c8ed8809353b1f19193a8badf3

  • Size

    7.3MB

  • Sample

    240524-kn9bmsbf2t

  • MD5

    a5891df2ec1f8f0335bc744b24b4d646

  • SHA1

    d8aced6d7fd09deb2580990cecd2594c17d75c4d

  • SHA256

    92105da09cc48e4f81bdfe124904bef025ee94c8ed8809353b1f19193a8badf3

  • SHA512

    eae0d11b4e25ab03a194c9fd0a844559b66e9f34809a34509a61f86b8a02d48193b74b937fdf2857ad473598fb3ec888d8dbf126637750bca46d0e3c7640ffa3

  • SSDEEP

    98304:6iqnIOSIVtC+icuty84gK7NcnJygMABQYCFsq1kkkkkkkkkkkkkkkkkkxkkkkkkb:8IpIjut1Bc+naA6YCFVy2A026

Malware Config

Targets

    • Target

      92105da09cc48e4f81bdfe124904bef025ee94c8ed8809353b1f19193a8badf3

    • Size

      7.3MB

    • MD5

      a5891df2ec1f8f0335bc744b24b4d646

    • SHA1

      d8aced6d7fd09deb2580990cecd2594c17d75c4d

    • SHA256

      92105da09cc48e4f81bdfe124904bef025ee94c8ed8809353b1f19193a8badf3

    • SHA512

      eae0d11b4e25ab03a194c9fd0a844559b66e9f34809a34509a61f86b8a02d48193b74b937fdf2857ad473598fb3ec888d8dbf126637750bca46d0e3c7640ffa3

    • SSDEEP

      98304:6iqnIOSIVtC+icuty84gK7NcnJygMABQYCFsq1kkkkkkkkkkkkkkkkkkxkkkkkkb:8IpIjut1Bc+naA6YCFVy2A026

    • Modifies firewall policy service

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks