General

  • Target

    3a9f7bb0d1c9b9e08ce7516cdbee2750N.exe

  • Size

    7.3MB

  • Sample

    240807-bc4gkszclg

  • MD5

    3a9f7bb0d1c9b9e08ce7516cdbee2750

  • SHA1

    299b0564cb80819fd4b968769878d46e35137a26

  • SHA256

    f0c093b7714520664fdb024638220ab6e936ae397af88d44df9034d2eee5780f

  • SHA512

    76a27340c32ee0ccdf9ac6b96cbd473475b15a1beaeaa491328288449f205c43fbe56893c61bca5131cb27bb0f3ac889538b798394c8680403218ef2f169a13e

  • SSDEEP

    196608:hZWyGM5gZWMCY6o89hl1ITKPrBC5WO3KAG5Y:hgyK5rK0TKPrNEKw

Malware Config

Targets

    • Target

      3a9f7bb0d1c9b9e08ce7516cdbee2750N.exe

    • Size

      7.3MB

    • MD5

      3a9f7bb0d1c9b9e08ce7516cdbee2750

    • SHA1

      299b0564cb80819fd4b968769878d46e35137a26

    • SHA256

      f0c093b7714520664fdb024638220ab6e936ae397af88d44df9034d2eee5780f

    • SHA512

      76a27340c32ee0ccdf9ac6b96cbd473475b15a1beaeaa491328288449f205c43fbe56893c61bca5131cb27bb0f3ac889538b798394c8680403218ef2f169a13e

    • SSDEEP

      196608:hZWyGM5gZWMCY6o89hl1ITKPrBC5WO3KAG5Y:hgyK5rK0TKPrNEKw

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks