General

  • Target

    Anydesk6.6.zip

  • Size

    2.7MB

  • Sample

    240919-hq3wjawfkj

  • MD5

    6efec98c1bef69b0eb68dfd5204dcfa8

  • SHA1

    a082367025c847c25d455414f6e2ffc3f0be2656

  • SHA256

    25b7267bd776447563554f6e98e4bac1944a3f800c1658231df71293d0dfb07e

  • SHA512

    91fb8faba7a7f891dc47176ea14e1a2c1a4c8dc1928a8e6d19951b74857a2539632ab26ef87d55c18d26e2cb2e0e0e38b072b7ef915c483c52dedac73319e0f8

  • SSDEEP

    49152:xN6BODrsZcu5lixu/IiojgkHUCXshSR9hUZMEYk5+5uR1m8KU560TMHv:x/DrsZc+LatXb9hUOEYa+5uRIve68MHv

Malware Config

Targets

    • Target

      Anydesk6.6.msi

    • Size

      4.3MB

    • MD5

      ec6e20cf1e3298163f08b2166ba9fa33

    • SHA1

      2e829c7f7ab05279b2af14f61c8265e0ebbc32db

    • SHA256

      41241f3bc8472cba920e35528728ed3a1070aa6b48c50b34ad3f5dcf0dd4d9bb

    • SHA512

      88449b0e10e9f6762a173ea2bb4853c38bb3864a83a97024fa7138ca2e8657daf03c1aa5def0b629d775a0e7f45d9e9b11b27e626f1b9a10ec1a91f90fbf8aa3

    • SSDEEP

      98304:KgBB2Siit8OEzYhTn9XwCA4IkVMDA+loJ:Hiitm0hhwl9NloJ

    • UAC bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Modifies RDP port number used by Windows

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks