General

  • Target

    d5942ce0cd067d5d8ef5ef6c9ceeb3fff2e26c57c2855f42d8076d2bcd3788be.exe

  • Size

    9.7MB

  • Sample

    240726-g1caws1cnn

  • MD5

    3572ee7941ba7a5768248935d6c66400

  • SHA1

    4dd2d29a658672cfd8b266c9d1f83d86e0763e48

  • SHA256

    d5942ce0cd067d5d8ef5ef6c9ceeb3fff2e26c57c2855f42d8076d2bcd3788be

  • SHA512

    6e71442a3c5fe1743242b4261dd0b3b088c0a8b3676dd017da9679e1e5825a30d568bdb02a95d49c738fce9ab0941eab5ccf7fe5d93dd79dd69662a411932053

  • SSDEEP

    196608:+LRYE0SCI4rbECIwBbiL4c7uXIYaK+GutOHpDRw0nptlVOmpLEMSUsY:+NYn/8ChUvnGutMpDDnpnVVpQfUsY

Malware Config

Targets

    • Target

      d5942ce0cd067d5d8ef5ef6c9ceeb3fff2e26c57c2855f42d8076d2bcd3788be.exe

    • Size

      9.7MB

    • MD5

      3572ee7941ba7a5768248935d6c66400

    • SHA1

      4dd2d29a658672cfd8b266c9d1f83d86e0763e48

    • SHA256

      d5942ce0cd067d5d8ef5ef6c9ceeb3fff2e26c57c2855f42d8076d2bcd3788be

    • SHA512

      6e71442a3c5fe1743242b4261dd0b3b088c0a8b3676dd017da9679e1e5825a30d568bdb02a95d49c738fce9ab0941eab5ccf7fe5d93dd79dd69662a411932053

    • SSDEEP

      196608:+LRYE0SCI4rbECIwBbiL4c7uXIYaK+GutOHpDRw0nptlVOmpLEMSUsY:+NYn/8ChUvnGutMpDDnpnVVpQfUsY

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks