General

  • Target

    Snail_protected.exe

  • Size

    5.2MB

  • Sample

    240914-gs34mszgka

  • MD5

    7adab999bf52c78a3f2fd963884f190e

  • SHA1

    33a9a34e4b5ab5616b2eb839b5c4795888ee9989

  • SHA256

    9dd7d4be72a74c3deb8e49443ab9489dace53275f15008c1a6b73ae03b2e7015

  • SHA512

    904b964c48fa937a8bccbfbf9c6be5a9b404497604208e990d340ec51abb1feb38e9d2bdbbbfd638e716557113a87917e8401143cf534289b62413087e64c30d

  • SSDEEP

    98304:CSXCzDzK7uj4wJpszSnrKk7rnFoxqIgeJZ6OioQODdkbwJxWCu4vauoi:LkzKy4YpszSntoxqjugOioQOhkbCxHph

Malware Config

Targets

    • Target

      Snail_protected.exe

    • Size

      5.2MB

    • MD5

      7adab999bf52c78a3f2fd963884f190e

    • SHA1

      33a9a34e4b5ab5616b2eb839b5c4795888ee9989

    • SHA256

      9dd7d4be72a74c3deb8e49443ab9489dace53275f15008c1a6b73ae03b2e7015

    • SHA512

      904b964c48fa937a8bccbfbf9c6be5a9b404497604208e990d340ec51abb1feb38e9d2bdbbbfd638e716557113a87917e8401143cf534289b62413087e64c30d

    • SSDEEP

      98304:CSXCzDzK7uj4wJpszSnrKk7rnFoxqIgeJZ6OioQODdkbwJxWCu4vauoi:LkzKy4YpszSntoxqjugOioQOhkbCxHph

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks