General

  • Target

    0bb202100293c5493263a152c9c3ebd56391916233edb42f2e1f68b755d6fc21

  • Size

    10.8MB

  • Sample

    240526-mg2dkafa6t

  • MD5

    9c37167131d89e66654ba7e913a9d8da

  • SHA1

    fb6394d7f87b9601198de999c0ccca21c9d76e0e

  • SHA256

    0bb202100293c5493263a152c9c3ebd56391916233edb42f2e1f68b755d6fc21

  • SHA512

    282ce979d2c9a8b904560f1f1af70fde103971e1f60408abecab0cafd1771c7d542dd081d58f4800c418497a8f15d5eb68f837e66ff2ac172adc6664d5e74c44

  • SSDEEP

    196608:3Ntjjr3rmSB3QcrBiMcoxi/JbPZ5jF5tenC9+jwvS09TR3wC0EeWJxY+Hh:3Ntf7rmGliuMBbP3x/JTRgC0EeWJhB

Malware Config

Targets

    • Target

      0bb202100293c5493263a152c9c3ebd56391916233edb42f2e1f68b755d6fc21

    • Size

      10.8MB

    • MD5

      9c37167131d89e66654ba7e913a9d8da

    • SHA1

      fb6394d7f87b9601198de999c0ccca21c9d76e0e

    • SHA256

      0bb202100293c5493263a152c9c3ebd56391916233edb42f2e1f68b755d6fc21

    • SHA512

      282ce979d2c9a8b904560f1f1af70fde103971e1f60408abecab0cafd1771c7d542dd081d58f4800c418497a8f15d5eb68f837e66ff2ac172adc6664d5e74c44

    • SSDEEP

      196608:3Ntjjr3rmSB3QcrBiMcoxi/JbPZ5jF5tenC9+jwvS09TR3wC0EeWJxY+Hh:3Ntf7rmGliuMBbP3x/JTRgC0EeWJhB

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks