General

  • Target

    07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564.exe

  • Size

    3.1MB

  • Sample

    240820-g7rdds1dqm

  • MD5

    3990105c69d93c964f6e8bcf6bff7780

  • SHA1

    acbbaf0fda02934439a1a734c0eeaaaafb590311

  • SHA256

    07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564

  • SHA512

    4445ef7d45fc8dd120c90d29d1171fc7ee1307b69fbfed068b374a40813d36020c5110060732ea6c5d0fc58d56d4209b328f40ca866c0dfd59cf996ace7b093d

  • SSDEEP

    98304:jn287iOEfo/qHfekoiAhnfkirGDR4Gumu:r7ooefevjnfF6ZU

Malware Config

Targets

    • Target

      07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564.exe

    • Size

      3.1MB

    • MD5

      3990105c69d93c964f6e8bcf6bff7780

    • SHA1

      acbbaf0fda02934439a1a734c0eeaaaafb590311

    • SHA256

      07d3bbb53b9b8e8252dc07710edb1f85774cdda65205f0356d30e5b498562564

    • SHA512

      4445ef7d45fc8dd120c90d29d1171fc7ee1307b69fbfed068b374a40813d36020c5110060732ea6c5d0fc58d56d4209b328f40ca866c0dfd59cf996ace7b093d

    • SSDEEP

      98304:jn287iOEfo/qHfekoiAhnfkirGDR4Gumu:r7ooefevjnfF6ZU

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks