General

  • Target

    733adc3af6b400e4a403a6d66db5b660N.exe

  • Size

    2.5MB

  • Sample

    240829-c55qsazdnc

  • MD5

    733adc3af6b400e4a403a6d66db5b660

  • SHA1

    b850b1dad4634bef15c2ec25e09eb58a50fe42c8

  • SHA256

    06f475c0e9c0bccf07998e74d138a4320be5a584d5a562bf9b210361481b70b8

  • SHA512

    f68e82e25ac76a40ed564e9aa967a72bc17d9706bc780abcbfa443021cb3c5065d2aecdbc4124418bf165be0a0bcaeba9413f3ed9181ef57f5e643bb81ab8be2

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxl:Mxx9NUFkQx753uWuCyyxl

Malware Config

Targets

    • Target

      733adc3af6b400e4a403a6d66db5b660N.exe

    • Size

      2.5MB

    • MD5

      733adc3af6b400e4a403a6d66db5b660

    • SHA1

      b850b1dad4634bef15c2ec25e09eb58a50fe42c8

    • SHA256

      06f475c0e9c0bccf07998e74d138a4320be5a584d5a562bf9b210361481b70b8

    • SHA512

      f68e82e25ac76a40ed564e9aa967a72bc17d9706bc780abcbfa443021cb3c5065d2aecdbc4124418bf165be0a0bcaeba9413f3ed9181ef57f5e643bb81ab8be2

    • SSDEEP

      49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxl:Mxx9NUFkQx753uWuCyyxl

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks