General

  • Target

    1c4691f540e1a4290e8cd0150c4be41ed08d96b9cd4911f4c6194624d8cf5ab6

  • Size

    8.6MB

  • Sample

    240525-xxsrgaeh9z

  • MD5

    6105d05246b47a7751152e61d7bd2610

  • SHA1

    8e434e53de5e49441d2d0846c73ef15fbcdc7659

  • SHA256

    1c4691f540e1a4290e8cd0150c4be41ed08d96b9cd4911f4c6194624d8cf5ab6

  • SHA512

    4e5beba4049eac37b02fa1af392de5550ad325eaddf04a5aac530e33be4db57ae103adaf582674edcdadd7bbdcd92ca3bd93ac4b60d467dc9e6205285effcc21

  • SSDEEP

    196608:duY/qOO+cbfqF3rRX0Gcb+rk07M5hlX+0YLhFspETbXuahVyh240A/n5M:dRqOO+5F+z+rk0QF+3TsibXvDy0yn2

Malware Config

Targets

    • Target

      1c4691f540e1a4290e8cd0150c4be41ed08d96b9cd4911f4c6194624d8cf5ab6

    • Size

      8.6MB

    • MD5

      6105d05246b47a7751152e61d7bd2610

    • SHA1

      8e434e53de5e49441d2d0846c73ef15fbcdc7659

    • SHA256

      1c4691f540e1a4290e8cd0150c4be41ed08d96b9cd4911f4c6194624d8cf5ab6

    • SHA512

      4e5beba4049eac37b02fa1af392de5550ad325eaddf04a5aac530e33be4db57ae103adaf582674edcdadd7bbdcd92ca3bd93ac4b60d467dc9e6205285effcc21

    • SSDEEP

      196608:duY/qOO+cbfqF3rRX0Gcb+rk07M5hlX+0YLhFspETbXuahVyh240A/n5M:dRqOO+5F+z+rk0QF+3TsibXvDy0yn2

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks