General
-
Target
bootstrap_win.exe
-
Size
8.4MB
-
Sample
240904-v4e3vavhkh
-
MD5
94bb92418bf395fa8d5ac86ab036f121
-
SHA1
2a62229615d627cd225a783079caff4f22f4005a
-
SHA256
f41d12d5b736a82f4c53e3c3f242560dfd800a24076186399dd695f3b493184b
-
SHA512
7205e4e6a67f2685669bb2262e6f3c459978e20bf80497714d1b67ede1731b92c0ed067181c703ee8cd43bf9d5780469eda00706f4b96dfc7ba18bbc688f099e
-
SSDEEP
196608:dDHArnQmQ6ikz8BnfVamqeDR9Loa8S/qErUfN40v62U+MG:tiVQ6inNqeDR9ca7SErUfJy2Uo
Malware Config
Targets
-
-
Target
bootstrap_win.exe
-
Size
8.4MB
-
MD5
94bb92418bf395fa8d5ac86ab036f121
-
SHA1
2a62229615d627cd225a783079caff4f22f4005a
-
SHA256
f41d12d5b736a82f4c53e3c3f242560dfd800a24076186399dd695f3b493184b
-
SHA512
7205e4e6a67f2685669bb2262e6f3c459978e20bf80497714d1b67ede1731b92c0ed067181c703ee8cd43bf9d5780469eda00706f4b96dfc7ba18bbc688f099e
-
SSDEEP
196608:dDHArnQmQ6ikz8BnfVamqeDR9Loa8S/qErUfN40v62U+MG:tiVQ6inNqeDR9ca7SErUfJy2Uo
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1