Resubmissions

11/08/2024, 19:58

240811-ypwc3azbkb 9

General

  • Target

    SolaraV3.dll

  • Size

    6.4MB

  • Sample

    240811-ypwc3azbkb

  • MD5

    00d1ec7ef2ab88125ce0bd43a3f62d33

  • SHA1

    fde302f1421b94ae4b9e3aaa4cd4d65bcda40789

  • SHA256

    7953e72cb972278e947c83c6a8bdcba35c7f2225566dd1b4fff686077cace832

  • SHA512

    f56086204dc52a44ab35906a2c55dfe3d2418f8034e51664bcdefe44dd7b16a39d8f87dc0650f6e7e5f9d69ef88e1d4826bf2050cc69ecefd01d9bb958b4e8c6

  • SSDEEP

    196608:SGMIUWMIaAKFHsairmB8tm/+YTN5uyezSnC+v3uBg:TRd4qairmBy0+eQyWR+vgg

Malware Config

Targets

    • Target

      SolaraV3.dll

    • Size

      6.4MB

    • MD5

      00d1ec7ef2ab88125ce0bd43a3f62d33

    • SHA1

      fde302f1421b94ae4b9e3aaa4cd4d65bcda40789

    • SHA256

      7953e72cb972278e947c83c6a8bdcba35c7f2225566dd1b4fff686077cace832

    • SHA512

      f56086204dc52a44ab35906a2c55dfe3d2418f8034e51664bcdefe44dd7b16a39d8f87dc0650f6e7e5f9d69ef88e1d4826bf2050cc69ecefd01d9bb958b4e8c6

    • SSDEEP

      196608:SGMIUWMIaAKFHsairmB8tm/+YTN5uyezSnC+v3uBg:TRd4qairmBy0+eQyWR+vgg

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks