General

  • Target

    Apple.exe

  • Size

    231KB

  • Sample

    240720-1gs9vaxbpa

  • MD5

    2340b8a2bd837a5cff9b309477e482f7

  • SHA1

    9388ce8dd1e17e680e6ccf130e5a07beb06d0df8

  • SHA256

    5e1d6c967328d7b5c61028616420b13c83c3609bdc7667f75bbd923118dca19e

  • SHA512

    f44d430b857a52e39ba9b3d0c831dcf74663351046e472b8c265421e3d05ea14870776a18651658eaa509ccdae8ead2cadce6a54cbf14e625d844d7a933a8259

  • SSDEEP

    3072:wYwfMXIzqQWIY1LgWqoMcwBpdIi6MTBsOzu7m2N943SVMG34DmfGGEbt4m2b3cTd:6fMXIe/14ogFIk3LFCa7k

Malware Config

Targets

    • Target

      Apple.exe

    • Size

      231KB

    • MD5

      2340b8a2bd837a5cff9b309477e482f7

    • SHA1

      9388ce8dd1e17e680e6ccf130e5a07beb06d0df8

    • SHA256

      5e1d6c967328d7b5c61028616420b13c83c3609bdc7667f75bbd923118dca19e

    • SHA512

      f44d430b857a52e39ba9b3d0c831dcf74663351046e472b8c265421e3d05ea14870776a18651658eaa509ccdae8ead2cadce6a54cbf14e625d844d7a933a8259

    • SSDEEP

      3072:wYwfMXIzqQWIY1LgWqoMcwBpdIi6MTBsOzu7m2N943SVMG34DmfGGEbt4m2b3cTd:6fMXIe/14ogFIk3LFCa7k

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks