Resubmissions

14/08/2024, 18:31

240814-w6bc4ssblp 9

14/08/2024, 18:29

240814-w487csxapc 4

General

  • Target

    thesolara

  • Size

    78KB

  • Sample

    240814-w6bc4ssblp

  • MD5

    3b2d06e18e52ce13483a5e2b85eb4ca0

  • SHA1

    c34fadd357455775e0079e4aac51069cdce4a92e

  • SHA256

    7b7e45ac8a2013ec0cb3a9642ac16f01e91f3e08741363f96fd8c4ed3f4bba5c

  • SHA512

    ee7020be896ada7d3c349307aaa1702da24f1ed629d5975d486126fe80a31d063c1239765aec04a2950b4fed31f3fa53412c0eebe88716d052c6219ebef981be

  • SSDEEP

    768:XiroHlH5W5O2tqQtj+tnNtEQtLMQtryBMYt01BthcstJEtREtMVtVRAt0ztkRtQs:xdSy4b0/P1C1f5KgmV7Cr+t

Malware Config

Targets

    • Target

      thesolara

    • Size

      78KB

    • MD5

      3b2d06e18e52ce13483a5e2b85eb4ca0

    • SHA1

      c34fadd357455775e0079e4aac51069cdce4a92e

    • SHA256

      7b7e45ac8a2013ec0cb3a9642ac16f01e91f3e08741363f96fd8c4ed3f4bba5c

    • SHA512

      ee7020be896ada7d3c349307aaa1702da24f1ed629d5975d486126fe80a31d063c1239765aec04a2950b4fed31f3fa53412c0eebe88716d052c6219ebef981be

    • SSDEEP

      768:XiroHlH5W5O2tqQtj+tnNtEQtLMQtryBMYt01BthcstJEtREtMVtVRAt0ztkRtQs:xdSy4b0/P1C1f5KgmV7Cr+t

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Blocklisted process makes network request

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks