General

  • Target

    Yusei.cc Temp.exe

  • Size

    3.3MB

  • Sample

    240710-z1eecszfmr

  • MD5

    28bdaf7f5ff28ae8e20569c971e72691

  • SHA1

    33a41b837f2a30b113407cb299cc72bdb33f3196

  • SHA256

    0141cb91e5cb0e7e2dacc2559cbeb34feda7464d37bfda2e71c4d4c9a8ca75c5

  • SHA512

    4a3fc5acaa8d0a99c77a31d0a7d266ba17649038f085c7ffde067e56453850635928e7a12a90049bad7598a62031f8327fb0972001c2649897d197b376f88164

  • SSDEEP

    98304:dbtRsknzDojeQxGg03SlJRYi/iDvP4ct89YpzBR:d3rzDo0+JGEyvP4B9QzBR

Malware Config

Targets

    • Target

      Yusei.cc Temp.exe

    • Size

      3.3MB

    • MD5

      28bdaf7f5ff28ae8e20569c971e72691

    • SHA1

      33a41b837f2a30b113407cb299cc72bdb33f3196

    • SHA256

      0141cb91e5cb0e7e2dacc2559cbeb34feda7464d37bfda2e71c4d4c9a8ca75c5

    • SHA512

      4a3fc5acaa8d0a99c77a31d0a7d266ba17649038f085c7ffde067e56453850635928e7a12a90049bad7598a62031f8327fb0972001c2649897d197b376f88164

    • SSDEEP

      98304:dbtRsknzDojeQxGg03SlJRYi/iDvP4ct89YpzBR:d3rzDo0+JGEyvP4B9QzBR

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks