General

  • Target

    5f4314eb80d6aaecac1b21812955a0ae5b46ffa87e49fdabe9d4220a8e75e0f1

  • Size

    6.3MB

  • Sample

    240525-s2lrhahc2x

  • MD5

    a592e723866e3d9acbfa7227d51f8a17

  • SHA1

    df04d9f40a6674e2c62223b00fbc515474276f63

  • SHA256

    5f4314eb80d6aaecac1b21812955a0ae5b46ffa87e49fdabe9d4220a8e75e0f1

  • SHA512

    988f6651f7b03dc29f5ad2625ac8c59904041187e1579c6962071c125defe2c3055518829135f5e36b6fb8b7e89e0d3f8adc5692a7101bfb4b7df942c79f32f2

  • SSDEEP

    196608:SpeZCSC+GiQWmBUq/pLwqXQakN+od8nniduTZ:JCnWG5BwGQ1d8nr1

Malware Config

Targets

    • Target

      5f4314eb80d6aaecac1b21812955a0ae5b46ffa87e49fdabe9d4220a8e75e0f1

    • Size

      6.3MB

    • MD5

      a592e723866e3d9acbfa7227d51f8a17

    • SHA1

      df04d9f40a6674e2c62223b00fbc515474276f63

    • SHA256

      5f4314eb80d6aaecac1b21812955a0ae5b46ffa87e49fdabe9d4220a8e75e0f1

    • SHA512

      988f6651f7b03dc29f5ad2625ac8c59904041187e1579c6962071c125defe2c3055518829135f5e36b6fb8b7e89e0d3f8adc5692a7101bfb4b7df942c79f32f2

    • SSDEEP

      196608:SpeZCSC+GiQWmBUq/pLwqXQakN+od8nniduTZ:JCnWG5BwGQ1d8nr1

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks