General

  • Target

    sample

  • Size

    553KB

  • Sample

    240928-f534qsyhmm

  • MD5

    871f08b80269ead71364ea7afa6e0d18

  • SHA1

    32c983baf9111cf2592e71db03506b9e3b818054

  • SHA256

    744d125610906c3544e913902884f532c21f373bb03f5daab336c8f330060a89

  • SHA512

    e92c278c63d911b1bdeb8aebe631b1e93b48f0de616a74c26df66189625fd925c5847e52c6378e23fa89137f16de994cef38c20cf2c52d313d69d0c8ab707483

  • SSDEEP

    768:wP5xQzeV0UeeHfbD2qnsYC2annCwgLIL3LmLCLnLDLFcdwr1xFwjiecj0v0XCdUj:J31HFVHLb+XKzZfuB+pA4vbNYAH

Malware Config

Targets

    • Target

      sample

    • Size

      553KB

    • MD5

      871f08b80269ead71364ea7afa6e0d18

    • SHA1

      32c983baf9111cf2592e71db03506b9e3b818054

    • SHA256

      744d125610906c3544e913902884f532c21f373bb03f5daab336c8f330060a89

    • SHA512

      e92c278c63d911b1bdeb8aebe631b1e93b48f0de616a74c26df66189625fd925c5847e52c6378e23fa89137f16de994cef38c20cf2c52d313d69d0c8ab707483

    • SSDEEP

      768:wP5xQzeV0UeeHfbD2qnsYC2annCwgLIL3LmLCLnLDLFcdwr1xFwjiecj0v0XCdUj:J31HFVHLb+XKzZfuB+pA4vbNYAH

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks