General

  • Target

    loader.exe

  • Size

    4.8MB

  • Sample

    240611-gbxkjaxblj

  • MD5

    29f96a824141fe7a04589b67ee53edec

  • SHA1

    bda00deeef354a6197cd5d2a9a56a93d2ffba917

  • SHA256

    583c0e4cf4d95053c2ef79ccb19894837a104b9dfa5d65a80113d17633ff0fa6

  • SHA512

    223e21c5f21c59dca00a17f76e26480d3f516482001ed75bb76f305ec3be9d75dc418366a3f475119d89751acead3081e33de5570d5e637ec05e0a6efff21c30

  • SSDEEP

    98304:W1jRkfKsLdVIKicKe3Qj2Ya36Ve0gMkUeDbHa4z6/wEsga3xXk:KRkfKsLBt3QjyFzMkVDbH3z6jay

Malware Config

Targets

    • Target

      loader.exe

    • Size

      4.8MB

    • MD5

      29f96a824141fe7a04589b67ee53edec

    • SHA1

      bda00deeef354a6197cd5d2a9a56a93d2ffba917

    • SHA256

      583c0e4cf4d95053c2ef79ccb19894837a104b9dfa5d65a80113d17633ff0fa6

    • SHA512

      223e21c5f21c59dca00a17f76e26480d3f516482001ed75bb76f305ec3be9d75dc418366a3f475119d89751acead3081e33de5570d5e637ec05e0a6efff21c30

    • SSDEEP

      98304:W1jRkfKsLdVIKicKe3Qj2Ya36Ve0gMkUeDbHa4z6/wEsga3xXk:KRkfKsLBt3QjyFzMkVDbH3z6jay

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks