General

  • Target

    kyle cracking.rar

  • Size

    7.9MB

  • Sample

    240921-cbazbazdmp

  • MD5

    c098533414fd886dc4a2a473d2fef1fd

  • SHA1

    5a70c788c53c83559d3aa6841532e4046753dd25

  • SHA256

    9d9b5187ce3d32ba2d6c1d7f0e3e773ae4ae8886350e7abbbc2aea15d9c8af82

  • SHA512

    a8923872a6e9676654dd17ee9cf977f10174cce5412a995c200f91762d329d0b09e8f31ab9f94d4e81857b518b535fbf1d2c4e6d56bcb23adacb3dd82c016366

  • SSDEEP

    196608:FU2TZ2pWWhoLoUVl0lSY9DOLAZ/OLA4FGGgy:pINO8zh/F/O/gy

Malware Config

Targets

    • Target

      kyle cracking.rar

    • Size

      7.9MB

    • MD5

      c098533414fd886dc4a2a473d2fef1fd

    • SHA1

      5a70c788c53c83559d3aa6841532e4046753dd25

    • SHA256

      9d9b5187ce3d32ba2d6c1d7f0e3e773ae4ae8886350e7abbbc2aea15d9c8af82

    • SHA512

      a8923872a6e9676654dd17ee9cf977f10174cce5412a995c200f91762d329d0b09e8f31ab9f94d4e81857b518b535fbf1d2c4e6d56bcb23adacb3dd82c016366

    • SSDEEP

      196608:FU2TZ2pWWhoLoUVl0lSY9DOLAZ/OLA4FGGgy:pINO8zh/F/O/gy

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks