General

  • Target

    n.exe

  • Size

    4.7MB

  • Sample

    240611-hfvr6sycrp

  • MD5

    79ffc0a288862e26114769a9cd736bf5

  • SHA1

    1434ad3050d1204987161d271c52448635bbf833

  • SHA256

    c0065563c6c85946730ef077b9fb3820cfe59e19f50eee259a60647a56fcb6f3

  • SHA512

    a404d4b459703b5b935e2231a2223bc89a94f1438f365335c634ba97b82bdb9c292875673903415c7d0979514d8868ec1a418fd021709dfffb5928b78bfc0c80

  • SSDEEP

    98304:nOWLgD7YVuw0r50diU2Ea6UibMs7IqqCr4BK24G+:/8suj0dJa0AsnqC0l

Malware Config

Targets

    • Target

      n.exe

    • Size

      4.7MB

    • MD5

      79ffc0a288862e26114769a9cd736bf5

    • SHA1

      1434ad3050d1204987161d271c52448635bbf833

    • SHA256

      c0065563c6c85946730ef077b9fb3820cfe59e19f50eee259a60647a56fcb6f3

    • SHA512

      a404d4b459703b5b935e2231a2223bc89a94f1438f365335c634ba97b82bdb9c292875673903415c7d0979514d8868ec1a418fd021709dfffb5928b78bfc0c80

    • SSDEEP

      98304:nOWLgD7YVuw0r50diU2Ea6UibMs7IqqCr4BK24G+:/8suj0dJa0AsnqC0l

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks