General

  • Target

    Verse_Spoofer.rar

  • Size

    44.9MB

  • Sample

    240726-3b53kavbje

  • MD5

    0f82749870cfac62fb256a7abd461303

  • SHA1

    6f5a425d56a51cc18ef2d8defb4eb1a9cced0157

  • SHA256

    02320fa059952d39d22782bf2b6423573f480b735d5b0518b2f53a0dd44a2de1

  • SHA512

    37eaa2b9296b6624e0694b7844f5545f644558b68674e650d8144a0c684bb3dc39805cd6a341fb0184bf72dcffb0a0010d0473871bf1b2154f4f0888469701e1

  • SSDEEP

    786432:SfRbThuzjJib7nzifgEISuKLo0VqNqydJgWktcclYZMh7CCQqVlKLT:SRbThunQv8gfcON3WWkSZZIBKP

Malware Config

Targets

    • Target

      Verse Spoofer/Injector.exe

    • Size

      38KB

    • MD5

      a19948457af73fe0f3c49b49badf6abd

    • SHA1

      4ea1c82444ba61bcb7dfa189acbfc80847fe42da

    • SHA256

      3b6136a46763fc80aa5e6bcffd52023ec36678bc9d2dbf87f1f8527861a67a86

    • SHA512

      d035be1546ae86a33aaf682dfa20aa35d3d5ea350e11ef61849e4ec03d63673e1726b18b3f9abfa8e7b4d4d76cca45411bf106bb6425c2da048601ccaf2848f0

    • SSDEEP

      768:agK4Vns9VKClWwy0pGtqXnF/PME2+0nhMkTdhKVlD7+ZsRID6+:agWLKCl9yYW5TikTdQVlD7JID

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Verse Spoofer/Verse V4.15.exe

    • Size

      30.0MB

    • MD5

      15ee2efb6fe685d6d5217c58c33d98e2

    • SHA1

      4a6b8fcb5c21621a81c35cd367e186985044408c

    • SHA256

      336c6f0d9de3de21f971c92e2239dac504580b4259602f9d602d0c4d7a2dacce

    • SHA512

      23f0b7cd6b1412bd1a97910efd0462e3078139fafe3cc857d0969fb432448d85b65273822bee6daee8903394230fa15a83fb1a1326580d02490dbf8015f43239

    • SSDEEP

      786432:3zKrKrbA+pjd0AG04wFoVKjPZCgJVehG4+d:D8K/A+pB0GZomCeVS+d

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Browser Information Discovery

1
T1217

Tasks