General

  • Target

    6a2764a5ef5b59d37c7513303b1926c0N.exe

  • Size

    3.8MB

  • Sample

    240813-3dlrpswckl

  • MD5

    6a2764a5ef5b59d37c7513303b1926c0

  • SHA1

    aca538a07bb5a91efe92377f47d98db1a5d16989

  • SHA256

    f3395860e06cc81f6d90c8212ab709b00e61f3f136130b8af8883465445928ad

  • SHA512

    596ff7b53b6c19d08e504b669e7897630c5533c41fc492e028e858c29e73469b89ee4eba1cbaa320f4aac6855515888ccf8904df418873c1217fd2683f9f9304

  • SSDEEP

    98304:P7m+ij9HD0+jCihNRkl/W6aG/wcKnfu8NUT6Kt:i+y4ihkl/Wo/afHPU

Malware Config

Targets

    • Target

      6a2764a5ef5b59d37c7513303b1926c0N.exe

    • Size

      3.8MB

    • MD5

      6a2764a5ef5b59d37c7513303b1926c0

    • SHA1

      aca538a07bb5a91efe92377f47d98db1a5d16989

    • SHA256

      f3395860e06cc81f6d90c8212ab709b00e61f3f136130b8af8883465445928ad

    • SHA512

      596ff7b53b6c19d08e504b669e7897630c5533c41fc492e028e858c29e73469b89ee4eba1cbaa320f4aac6855515888ccf8904df418873c1217fd2683f9f9304

    • SSDEEP

      98304:P7m+ij9HD0+jCihNRkl/W6aG/wcKnfu8NUT6Kt:i+y4ihkl/Wo/afHPU

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks