General

  • Target

    dabff55fbaf499428753fad48a5f76d0N.exe

  • Size

    2.5MB

  • Sample

    240907-lwmy2sxgrm

  • MD5

    dabff55fbaf499428753fad48a5f76d0

  • SHA1

    d2f665fca08fa2a191eec5ab8c750a71a77a3854

  • SHA256

    8650cc32a68d474938c678d1e2c15b56cd3c7553d17b82cf7fa384b9b2cfbd14

  • SHA512

    8c32dcd2d0c2b4ee604f0e9b09b3ca2610eb98de60ce80f9091bb6b30467610ee833ab9ab48a33841a0206182b84a63b04084ea97a535c617f14437e713656ce

  • SSDEEP

    49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxF:hxx9NUFkQx753uWuCyyxF

Malware Config

Targets

    • Target

      dabff55fbaf499428753fad48a5f76d0N.exe

    • Size

      2.5MB

    • MD5

      dabff55fbaf499428753fad48a5f76d0

    • SHA1

      d2f665fca08fa2a191eec5ab8c750a71a77a3854

    • SHA256

      8650cc32a68d474938c678d1e2c15b56cd3c7553d17b82cf7fa384b9b2cfbd14

    • SHA512

      8c32dcd2d0c2b4ee604f0e9b09b3ca2610eb98de60ce80f9091bb6b30467610ee833ab9ab48a33841a0206182b84a63b04084ea97a535c617f14437e713656ce

    • SSDEEP

      49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxF:hxx9NUFkQx753uWuCyyxF

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks