General

  • Target

    UBGG Internal.exe

  • Size

    6.3MB

  • Sample

    240608-garmwshd9z

  • MD5

    d4e1dc6dd9095039646485bdb5b2a452

  • SHA1

    b50fd8a91e5203aa52cd8ebfa55a69705fc1af9c

  • SHA256

    fe4bf4127f90432d512fd211363d59f552c6741bc4625a08bca9ac2c89b86ea9

  • SHA512

    556afcfb8424a2b3ca783e199ec1958e0171bbfc0d633da8b264fc42506bedda8ad393a5c266b190e2c47ab8039993e90f561d4f5995c80862002296ed26e530

  • SSDEEP

    98304:mtsSlQpwe40HXnEshBljnOgV2hcOwSfvfhk2MfYDY1GgOw9c41VBji0ChmpP/:mVQpdXHXnnhNV2hcDKXhV+UYJO8c8fn

Malware Config

Targets

    • Target

      UBGG Internal.exe

    • Size

      6.3MB

    • MD5

      d4e1dc6dd9095039646485bdb5b2a452

    • SHA1

      b50fd8a91e5203aa52cd8ebfa55a69705fc1af9c

    • SHA256

      fe4bf4127f90432d512fd211363d59f552c6741bc4625a08bca9ac2c89b86ea9

    • SHA512

      556afcfb8424a2b3ca783e199ec1958e0171bbfc0d633da8b264fc42506bedda8ad393a5c266b190e2c47ab8039993e90f561d4f5995c80862002296ed26e530

    • SSDEEP

      98304:mtsSlQpwe40HXnEshBljnOgV2hcOwSfvfhk2MfYDY1GgOw9c41VBji0ChmpP/:mVQpdXHXnnhNV2hcDKXhV+UYJO8c8fn

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks