General

  • Target

    29a45face7eab6c08a8936739ddd8b63116ed23e5638eee914734080013acb29

  • Size

    6.2MB

  • Sample

    240527-trjd3aba86

  • MD5

    ca428ee59cb833e7a19b66e9f935d4c8

  • SHA1

    60d5d626f50a0dcd32f8931abe9d3b121e0fb71a

  • SHA256

    29a45face7eab6c08a8936739ddd8b63116ed23e5638eee914734080013acb29

  • SHA512

    d6afec966732970e0ec73187e6f01c093f0abe8e99770009b0fbf45dcde2f9ea267ab8bf1422e68c2d3b39d4085274a6af5e836a7bd768c2dcdce0353b712771

  • SSDEEP

    196608:/h9xIN48LD6xSg8sR5AX0zjTy7q29kGIeokYuX4Nzc0JyBo6d/RBikeFeKigysTc:ZLIG8Lhg8sR5K0zjTy7q29kGIeokYuXN

Malware Config

Targets

    • Target

      29a45face7eab6c08a8936739ddd8b63116ed23e5638eee914734080013acb29

    • Size

      6.2MB

    • MD5

      ca428ee59cb833e7a19b66e9f935d4c8

    • SHA1

      60d5d626f50a0dcd32f8931abe9d3b121e0fb71a

    • SHA256

      29a45face7eab6c08a8936739ddd8b63116ed23e5638eee914734080013acb29

    • SHA512

      d6afec966732970e0ec73187e6f01c093f0abe8e99770009b0fbf45dcde2f9ea267ab8bf1422e68c2d3b39d4085274a6af5e836a7bd768c2dcdce0353b712771

    • SSDEEP

      196608:/h9xIN48LD6xSg8sR5AX0zjTy7q29kGIeokYuX4Nzc0JyBo6d/RBikeFeKigysTc:ZLIG8Lhg8sR5K0zjTy7q29kGIeokYuXN

    • Modifies firewall policy service

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks