General

  • Target

    1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984

  • Size

    9.1MB

  • Sample

    240823-re5qesybqg

  • MD5

    8c4a8c70e65686184b1713fd5d9475e5

  • SHA1

    b4ae29264869f932d999b7d9729eee4543bd0747

  • SHA256

    1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984

  • SHA512

    692447b769f0e4d0401713ed494c4160fe37cdff37584d62cb7b24a778a3e6ea91d2291f3c3b7ffb0d151ffd91ea12461e40c4d2b5c7d5e7f538c2c3d614ad7a

  • SSDEEP

    196608:yW1pXAmPFRLzZCZW8/PgcSS3uQyl620Y:yW1pwmPFRXgHeQ8620

Malware Config

Targets

    • Target

      1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984

    • Size

      9.1MB

    • MD5

      8c4a8c70e65686184b1713fd5d9475e5

    • SHA1

      b4ae29264869f932d999b7d9729eee4543bd0747

    • SHA256

      1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984

    • SHA512

      692447b769f0e4d0401713ed494c4160fe37cdff37584d62cb7b24a778a3e6ea91d2291f3c3b7ffb0d151ffd91ea12461e40c4d2b5c7d5e7f538c2c3d614ad7a

    • SSDEEP

      196608:yW1pXAmPFRLzZCZW8/PgcSS3uQyl620Y:yW1pwmPFRXgHeQ8620

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks