General

  • Target

    cbcfdd32a836531eedf06b413278288bdd85316fe3c6a148814084823beb09b9

  • Size

    2.5MB

  • Sample

    240528-dnxjhsce7z

  • MD5

    5ca005a9e762448e7f22ac187729be56

  • SHA1

    28d031b5ad6412280afbeec70c0fece85d2e86b7

  • SHA256

    cbcfdd32a836531eedf06b413278288bdd85316fe3c6a148814084823beb09b9

  • SHA512

    ba3f933b42c14a369b7b9e22906bf56b328c686cfce6709ffaffe05d765a63c78e16d019ad072754b95d3e6ff2922c673b19db4af720981896dee9acec579289

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxa:Mxx9NUFkQx753uWuCyyxa

Malware Config

Targets

    • Target

      cbcfdd32a836531eedf06b413278288bdd85316fe3c6a148814084823beb09b9

    • Size

      2.5MB

    • MD5

      5ca005a9e762448e7f22ac187729be56

    • SHA1

      28d031b5ad6412280afbeec70c0fece85d2e86b7

    • SHA256

      cbcfdd32a836531eedf06b413278288bdd85316fe3c6a148814084823beb09b9

    • SHA512

      ba3f933b42c14a369b7b9e22906bf56b328c686cfce6709ffaffe05d765a63c78e16d019ad072754b95d3e6ff2922c673b19db4af720981896dee9acec579289

    • SSDEEP

      49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxa:Mxx9NUFkQx753uWuCyyxa

    • Modifies visiblity of hidden/system files in Explorer

    • Detects executables packed with Themida

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks