General
-
Target
Loader.exe
-
Size
6.8MB
-
Sample
240721-3vygts1cqg
-
MD5
780919d2cf05e82da80292f5539f1386
-
SHA1
9ea29b7e44f6e3536490f75e0332470b55a5e901
-
SHA256
507290d62e5cdc13a9bee4306461d9c8fa07d7fb9facb3591c667a6b07df8b3d
-
SHA512
574f0f1af4f82bf7d18eef0dfb48d4ccf48462a17a871e4df49043cd1a9f7e4ebc7d9239d7380cde3d2a4b585b4c2440a7874128b4e71b714c2b3c9ee5598625
-
SSDEEP
98304:yPdQEoX5wRgUYkeFQHgbuy195Tb2qC1P9BU0HYC8vjDRM26w3vCYsDsc7CcU:Y+aRgOAS5q+PPc16iCYsDX7CcU
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
6.8MB
-
MD5
780919d2cf05e82da80292f5539f1386
-
SHA1
9ea29b7e44f6e3536490f75e0332470b55a5e901
-
SHA256
507290d62e5cdc13a9bee4306461d9c8fa07d7fb9facb3591c667a6b07df8b3d
-
SHA512
574f0f1af4f82bf7d18eef0dfb48d4ccf48462a17a871e4df49043cd1a9f7e4ebc7d9239d7380cde3d2a4b585b4c2440a7874128b4e71b714c2b3c9ee5598625
-
SSDEEP
98304:yPdQEoX5wRgUYkeFQHgbuy195Tb2qC1P9BU0HYC8vjDRM26w3vCYsDsc7CcU:Y+aRgOAS5q+PPc16iCYsDX7CcU
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1