General

  • Target

    9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884

  • Size

    2.1MB

  • Sample

    240919-ehzblazdmb

  • MD5

    c5034b6775785e1028cd88bbe0668d17

  • SHA1

    1accb10339dbd6c90b310260a87d2116049f4f9d

  • SHA256

    9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884

  • SHA512

    72d37d963d6c1250aefad13da35b94d279016012198779f97027dd425194a085ddc4348eac05b593c12a4bb8bb4d9b6949a1f54d5e0a5956c2a252f0bf42d895

  • SSDEEP

    49152:URbj8KejhM9uPSGGRvCYJRb5wEtdR/5s3x2BOUIKaqCCB:UhQDhM4GRxRb5wSdK1UIKaqXB

Score
9/10

Malware Config

Targets

    • Target

      9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884

    • Size

      2.1MB

    • MD5

      c5034b6775785e1028cd88bbe0668d17

    • SHA1

      1accb10339dbd6c90b310260a87d2116049f4f9d

    • SHA256

      9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884

    • SHA512

      72d37d963d6c1250aefad13da35b94d279016012198779f97027dd425194a085ddc4348eac05b593c12a4bb8bb4d9b6949a1f54d5e0a5956c2a252f0bf42d895

    • SSDEEP

      49152:URbj8KejhM9uPSGGRvCYJRb5wEtdR/5s3x2BOUIKaqCCB:UhQDhM4GRxRb5wSdK1UIKaqXB

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks