General

  • Target

    ddbbbcce1c0c2f1000349c6f2af99c7f17c7ce4627ab5aadb2de5cef2b91192c

  • Size

    6.1MB

  • Sample

    240526-k761maeb52

  • MD5

    ec263038029041fb497f6d644cee9659

  • SHA1

    3f45cf3bb5fa58d9ed53da36352fb4cfe150f1f8

  • SHA256

    ddbbbcce1c0c2f1000349c6f2af99c7f17c7ce4627ab5aadb2de5cef2b91192c

  • SHA512

    eb69ec8dfd6437db99e85a3beb92cb58deeb3f3168b15731c9930afaede7ab5dbcf47650913f102d2fa739e0e5952a7ccd60d740714fce9e8040f62ebcccba79

  • SSDEEP

    98304:i3ChA0UugO2JrslcE4N9l86g04dTSUfJDsTfRmBp9VzP7Bil9HwpSuUqetb3vZXn:nAyMrs086giU2TpSpXA9HvRqgfZelv4

Malware Config

Targets

    • Target

      ddbbbcce1c0c2f1000349c6f2af99c7f17c7ce4627ab5aadb2de5cef2b91192c

    • Size

      6.1MB

    • MD5

      ec263038029041fb497f6d644cee9659

    • SHA1

      3f45cf3bb5fa58d9ed53da36352fb4cfe150f1f8

    • SHA256

      ddbbbcce1c0c2f1000349c6f2af99c7f17c7ce4627ab5aadb2de5cef2b91192c

    • SHA512

      eb69ec8dfd6437db99e85a3beb92cb58deeb3f3168b15731c9930afaede7ab5dbcf47650913f102d2fa739e0e5952a7ccd60d740714fce9e8040f62ebcccba79

    • SSDEEP

      98304:i3ChA0UugO2JrslcE4N9l86g04dTSUfJDsTfRmBp9VzP7Bil9HwpSuUqetb3vZXn:nAyMrs086giU2TpSpXA9HvRqgfZelv4

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks