General

  • Target

    RippleWoofer.exe

  • Size

    15.8MB

  • Sample

    240902-pbenqazcnr

  • MD5

    4cc80d3eded1e6fe6291f410746fe182

  • SHA1

    43af000a15988600186898e6b313ec282c61a404

  • SHA256

    04f7cba421f4d722c23764c3c11952a500c458beb7af689baac4bc40cfb818c9

  • SHA512

    dec77618d20f28eb695329ace74915abc5af4d39010e770e78138c4d619fbeea8fd6a028ae8508ff4f6dcbd01a8cb84068727da4c8c81543dda8c8f63e7557a8

  • SSDEEP

    393216:+iI3FUn3pS/fMzNH/uYWmsgpC6PqjaaLq/aanPrrz73Mg2:+l1s3pqfGNH2Y5vpC6PqjaaLqSaXz4J

Malware Config

Targets

    • Target

      RippleWoofer.exe

    • Size

      15.8MB

    • MD5

      4cc80d3eded1e6fe6291f410746fe182

    • SHA1

      43af000a15988600186898e6b313ec282c61a404

    • SHA256

      04f7cba421f4d722c23764c3c11952a500c458beb7af689baac4bc40cfb818c9

    • SHA512

      dec77618d20f28eb695329ace74915abc5af4d39010e770e78138c4d619fbeea8fd6a028ae8508ff4f6dcbd01a8cb84068727da4c8c81543dda8c8f63e7557a8

    • SSDEEP

      393216:+iI3FUn3pS/fMzNH/uYWmsgpC6PqjaaLq/aanPrrz73Mg2:+l1s3pqfGNH2Y5vpC6PqjaaLqSaXz4J

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks