General

  • Target

    0XqHTML3yw.exe

  • Size

    6.0MB

  • Sample

    240719-ygkllazgkd

  • MD5

    595ac58a31309a190242332224b38b0b

  • SHA1

    685265c61aff806a26098c30fef95db188387b34

  • SHA256

    153e20ccb9da08dc69c9f0c5152961384d81d17672efb5b62c37d791d5dd3811

  • SHA512

    b926dbc9117bb0341b077412f99949b602c77df9943d0119cbdda7bfd58ec500faffb151c516581996fdcae614069b38f54fb71caf818bc59dd805c1fdc93fa0

  • SSDEEP

    196608:7L8IJpu+zejziWhikMdV0ETcUtu8b3r9J:8IJpukoziWhK0icI3rz

Malware Config

Targets

    • Target

      0XqHTML3yw.exe

    • Size

      6.0MB

    • MD5

      595ac58a31309a190242332224b38b0b

    • SHA1

      685265c61aff806a26098c30fef95db188387b34

    • SHA256

      153e20ccb9da08dc69c9f0c5152961384d81d17672efb5b62c37d791d5dd3811

    • SHA512

      b926dbc9117bb0341b077412f99949b602c77df9943d0119cbdda7bfd58ec500faffb151c516581996fdcae614069b38f54fb71caf818bc59dd805c1fdc93fa0

    • SSDEEP

      196608:7L8IJpu+zejziWhikMdV0ETcUtu8b3r9J:8IJpukoziWhK0icI3rz

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks