General

  • Target

    d1d30ca2f6e6b3a9f1207400822da6d4f79ec4118b3df1ed9dad914a6943311b

  • Size

    1.9MB

  • Sample

    240920-2vxd4asfpe

  • MD5

    85dedf0782097f4161cb3380c8baba00

  • SHA1

    d10a340a41b396e0b2779d9632479e064f8eb81b

  • SHA256

    d1d30ca2f6e6b3a9f1207400822da6d4f79ec4118b3df1ed9dad914a6943311b

  • SHA512

    06eaa4ae5944a8b8d3fdfe3d8b074d1307bbdb923df7187f9ca77f1977cc3494aae94888991f726060379367a208bab260fed8f8204e6b1e2af18f90b1b57fdf

  • SSDEEP

    49152:ISlNHydXboE+2pKWTvP6p9kB/GS0fsXCFr:ISjydNCYn0+S

Malware Config

Targets

    • Target

      d1d30ca2f6e6b3a9f1207400822da6d4f79ec4118b3df1ed9dad914a6943311b

    • Size

      1.9MB

    • MD5

      85dedf0782097f4161cb3380c8baba00

    • SHA1

      d10a340a41b396e0b2779d9632479e064f8eb81b

    • SHA256

      d1d30ca2f6e6b3a9f1207400822da6d4f79ec4118b3df1ed9dad914a6943311b

    • SHA512

      06eaa4ae5944a8b8d3fdfe3d8b074d1307bbdb923df7187f9ca77f1977cc3494aae94888991f726060379367a208bab260fed8f8204e6b1e2af18f90b1b57fdf

    • SSDEEP

      49152:ISlNHydXboE+2pKWTvP6p9kB/GS0fsXCFr:ISjydNCYn0+S

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks