General

  • Target

    Monolith.exe

  • Size

    3.9MB

  • Sample

    240819-ab8jgawbmm

  • MD5

    07dc38e53039d72d14e1cbca9856ba5b

  • SHA1

    d3a981998c26f59d08090150a813d5ab27e53526

  • SHA256

    d7435449ef4aecbd126115316045b002cb5aecfbcd6cbed9f3cbe62114502060

  • SHA512

    0b96bd20778d8524602de2ce6027500d8412b5fc8d00d3af34a954b55c82cc9d59fc988ffbf78a9e3866dae8862158ca31f1bd5e516527a8857d240f2df4c465

  • SSDEEP

    98304:uw8woLTfmptqpaKjSVO+Pm5hXvAPAtXI08y4OfcswrxhKAqLB/JsSYOkM:uwuH+pMP4Pk9vuAtXp8HOkBdhpqBJWQ

Malware Config

Targets

    • Target

      Monolith.exe

    • Size

      3.9MB

    • MD5

      07dc38e53039d72d14e1cbca9856ba5b

    • SHA1

      d3a981998c26f59d08090150a813d5ab27e53526

    • SHA256

      d7435449ef4aecbd126115316045b002cb5aecfbcd6cbed9f3cbe62114502060

    • SHA512

      0b96bd20778d8524602de2ce6027500d8412b5fc8d00d3af34a954b55c82cc9d59fc988ffbf78a9e3866dae8862158ca31f1bd5e516527a8857d240f2df4c465

    • SSDEEP

      98304:uw8woLTfmptqpaKjSVO+Pm5hXvAPAtXI08y4OfcswrxhKAqLB/JsSYOkM:uwuH+pMP4Pk9vuAtXp8HOkBdhpqBJWQ

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks