General

  • Target

    864d1a4e41a56c8f2e7e7eec89a47638.bin

  • Size

    3.4MB

  • Sample

    240622-drnqsavfrc

  • MD5

    7f7a320683edd7a7656aec593889dac9

  • SHA1

    8057146642dad024469fb77fba426ffe8df0218e

  • SHA256

    63f0fa0452fcb1afd64ca0258e6dd677493b71187b737f55edcf8c241b5c6a19

  • SHA512

    9fe997a661c8c14bf8b75ffc19c12936a843b129f69c89cd43050d0782479fed1ab142164343af5bfb56d05d61360269f3ab786db3b6b296d806f032f4d6ba8b

  • SSDEEP

    98304:6t5rFfgk8edJnDIQfQ1Lf5vNdRK2ALoXBWIw:+lR8eLDIEQFhv42AL+2

Malware Config

Targets

    • Target

      1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8.exe

    • Size

      3.6MB

    • MD5

      864d1a4e41a56c8f2e7e7eec89a47638

    • SHA1

      1f2cb906b92a945c7346c7139c7722230005c394

    • SHA256

      1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8

    • SHA512

      547a441369636e2548c7f8f94c3972269e04d80ee5a26803cc222942b28e457be908126fb4ff6bfde2a063ea1ef74ecba2aaceb58c68fba5c4fddcea5fbd91d3

    • SSDEEP

      98304:nroESehXGx5IkVu1f/ihp+t49Rd3iG2dEsL:s3ehXzgiSvGiv3tEj

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks