General

  • Target

    Unconfirmed3295.crdownload

  • Size

    5.1MB

  • Sample

    240919-fxyjaasglm

  • MD5

    a39f3b3f4d79cf0bfd704a178329ef19

  • SHA1

    019a9a660f4660a326318e6b1af26841eb8abad5

  • SHA256

    3561150add9795fede47e5de54c63b1326b030e7b22609fd36ca30f8ba41ab67

  • SHA512

    52325f243f81ec93b25ee70f85283ebffc7ad820aefdca65f315fbec2a131d82f829520e438911a311064f7cf919bb68bbea0b8d95c0357af403f6ae49159c61

  • SSDEEP

    98304:Iqjk7le2Qz0AGxdwf+tfX+gRXeVSHG3jWB2PW0YnYx3v+PPGu1hrO29Hxy0:Iqjk0MxrfX+gpekSjWCt9q180

Malware Config

Targets

    • Target

      ZEUS SOFTAIM!/RUN AS ADMIN/tranquil_radiance.exe

    • Size

      5.2MB

    • MD5

      5ed21aff5b09ec48e44a750e0abf4423

    • SHA1

      e83f10d045d00a18d17aeedb2b1901d223b9a00b

    • SHA256

      41e39eed1a999c27b61b2a9297ee969026fe9c5d7051c44c863a3bbafd07d4c5

    • SHA512

      418d26effcd36fb8fdb89e2a0dbe9e3f4cef52d67aa4de6cad2cf94a2f4cda0bd8fc896de81edd0e361938ee0ab899c70656d750e9d4e49aebeabc684909d646

    • SSDEEP

      98304:SuRHzIKiG/WxSFN0kqLto3Zt0z7QpU7kh2AOn6jz1PTMyCbj2:SczIKiGRD3b0z7QciZjpgy

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks