General

  • Target

    Loader (3).exe

  • Size

    13.3MB

  • Sample

    240703-p4bsjawejc

  • MD5

    d3567c93fb7a218ad130542ac8b02a76

  • SHA1

    e0f2e65b0eab58da6c26de403933ed6e22c0c364

  • SHA256

    7f19b0c0bc1ce4ce7b0bd072527f2feade5809d8de040c01945737534502a4de

  • SHA512

    a245ff8e8e6843298159ae207866df7f840865f02ac7c813faa9b7a5b1740b2b9bde496e98dc413f12597e96c5c8c62fde4845a774d904eb089070d80498be04

  • SSDEEP

    196608:YTYz2RUiumFCR0F29+AFB1Au21QUhX2nUMhjIhK/gVCPxWrJerBtZEmla:EYz2RR69+an9WaUioVCPoozZN8

Score
9/10

Malware Config

Targets

    • Target

      Loader (3).exe

    • Size

      13.3MB

    • MD5

      d3567c93fb7a218ad130542ac8b02a76

    • SHA1

      e0f2e65b0eab58da6c26de403933ed6e22c0c364

    • SHA256

      7f19b0c0bc1ce4ce7b0bd072527f2feade5809d8de040c01945737534502a4de

    • SHA512

      a245ff8e8e6843298159ae207866df7f840865f02ac7c813faa9b7a5b1740b2b9bde496e98dc413f12597e96c5c8c62fde4845a774d904eb089070d80498be04

    • SSDEEP

      196608:YTYz2RUiumFCR0F29+AFB1Au21QUhX2nUMhjIhK/gVCPxWrJerBtZEmla:EYz2RR69+an9WaUioVCPoozZN8

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks