General

  • Target

    9cec62fb802376768ad3fc73ef78aa6f2d34ec683696e597536ebe2b5fcb798d

  • Size

    6.3MB

  • Sample

    240526-q7sqwshe69

  • MD5

    1306e81bc13677c04abe69a1d2ca4e12

  • SHA1

    71e0de1475bbdfd9d244613d733ef33cf531e89c

  • SHA256

    9cec62fb802376768ad3fc73ef78aa6f2d34ec683696e597536ebe2b5fcb798d

  • SHA512

    413f356c8f556e720b0677d88e1d4328a21983e6ffc0f1c49ac19bde9df5e787409e2d7520e557ee7eeee39377140bc2a756aa2eb959c7b397ac3a7b124f86f2

  • SSDEEP

    98304:vMlj6Zrx1GIpunUNmw6M47l6xhi91sq0Na3PNSw+i35dbX7MztyszU:EluZrf6nUeNlv91sFA3lEk5dbX7Mz8V

Malware Config

Targets

    • Target

      9cec62fb802376768ad3fc73ef78aa6f2d34ec683696e597536ebe2b5fcb798d

    • Size

      6.3MB

    • MD5

      1306e81bc13677c04abe69a1d2ca4e12

    • SHA1

      71e0de1475bbdfd9d244613d733ef33cf531e89c

    • SHA256

      9cec62fb802376768ad3fc73ef78aa6f2d34ec683696e597536ebe2b5fcb798d

    • SHA512

      413f356c8f556e720b0677d88e1d4328a21983e6ffc0f1c49ac19bde9df5e787409e2d7520e557ee7eeee39377140bc2a756aa2eb959c7b397ac3a7b124f86f2

    • SSDEEP

      98304:vMlj6Zrx1GIpunUNmw6M47l6xhi91sq0Na3PNSw+i35dbX7MztyszU:EluZrf6nUeNlv91sFA3lEk5dbX7Mz8V

    • Modifies firewall policy service

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks