General

  • Target

    loader_spoff.exe

  • Size

    14.8MB

  • Sample

    240902-f29gcatflb

  • MD5

    599a4fb8c831911b34006b625fdf01f8

  • SHA1

    24d46fd642fc6054a50206fd2ac345b91aac33b6

  • SHA256

    afa307461c073e2105ba5e46415ef924bc53473a4679c9c00a8f7289e64d4b2e

  • SHA512

    1b3f74c74856236de0980a67900fdaeeec549fb8ee8f368eec3f0c57fc685a60f16513503c0b3c3c1f5e3cef9ce1454bc08139f5ef4fd4761ec4be34e9f242ba

  • SSDEEP

    196608:o9huXbljcZCmOXWKlmADLZlAJK3SUMzN5UA+EU8M4doL/r+UAhphS9ulLLqJRxKb:o9GjcKWK0LKNiskVm/iFScRLGK3h1p6i

Malware Config

Targets

    • Target

      loader_spoff.exe

    • Size

      14.8MB

    • MD5

      599a4fb8c831911b34006b625fdf01f8

    • SHA1

      24d46fd642fc6054a50206fd2ac345b91aac33b6

    • SHA256

      afa307461c073e2105ba5e46415ef924bc53473a4679c9c00a8f7289e64d4b2e

    • SHA512

      1b3f74c74856236de0980a67900fdaeeec549fb8ee8f368eec3f0c57fc685a60f16513503c0b3c3c1f5e3cef9ce1454bc08139f5ef4fd4761ec4be34e9f242ba

    • SSDEEP

      196608:o9huXbljcZCmOXWKlmADLZlAJK3SUMzN5UA+EU8M4doL/r+UAhphS9ulLLqJRxKb:o9GjcKWK0LKNiskVm/iFScRLGK3h1p6i

    • Deletes NTFS Change Journal

      The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Server Software Component: Terminal Services DLL

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks