General

  • Target

    4158cca57929bad77961f6890af9798fef664a0f2997d307fcf89d0a4903a355

  • Size

    2.5MB

  • Sample

    240823-y8lyqsvbma

  • MD5

    61b0374c461abd6b1a02fdbe9b352c3f

  • SHA1

    f6f53dc9299033e799a08f69cafdbd759754ea52

  • SHA256

    4158cca57929bad77961f6890af9798fef664a0f2997d307fcf89d0a4903a355

  • SHA512

    ac7e5eb462f28df72ae2e36b07d9bb77d58fd177642d4e7cfb6cabd0db97dcce83326fff3fa44ad45f6344b97af988e7a476f5168bd6e71823d2eb514f6bbc56

  • SSDEEP

    49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxb:hxx9NUFkQx753uWuCyyxb

Malware Config

Targets

    • Target

      4158cca57929bad77961f6890af9798fef664a0f2997d307fcf89d0a4903a355

    • Size

      2.5MB

    • MD5

      61b0374c461abd6b1a02fdbe9b352c3f

    • SHA1

      f6f53dc9299033e799a08f69cafdbd759754ea52

    • SHA256

      4158cca57929bad77961f6890af9798fef664a0f2997d307fcf89d0a4903a355

    • SHA512

      ac7e5eb462f28df72ae2e36b07d9bb77d58fd177642d4e7cfb6cabd0db97dcce83326fff3fa44ad45f6344b97af988e7a476f5168bd6e71823d2eb514f6bbc56

    • SSDEEP

      49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxb:hxx9NUFkQx753uWuCyyxb

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks