General
-
Target
UnlockAll.exe
-
Size
5.2MB
-
Sample
240930-vhc2cszdmh
-
MD5
6133c12e721ada1024880502ec740184
-
SHA1
48c3313e7a3837a9a0ba4107bfc017c9fda0c4c9
-
SHA256
0a6d6dd0286b03d733720371a5b9ffd6cb008bcc8f67d07806a470e159798c30
-
SHA512
17206ef6db20567d2c5a888ba9c3e0b089ca54c52dc54b1433136322087a6661c23979e6ab3341826f811a8f295eedf4ce54adc54f8bdfb3f8dcf3f7e15cb4c2
-
SSDEEP
98304:2geSX8FPrOJFSk1SB2f8y+QeIJd2TsH2t2aTnPBPnEAEf2OQWd+bYt:xeE88JgV2fDehYsPzREAY2OQZbK
Behavioral task
behavioral1
Sample
UnlockAll.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
UnlockAll.exe
-
Size
5.2MB
-
MD5
6133c12e721ada1024880502ec740184
-
SHA1
48c3313e7a3837a9a0ba4107bfc017c9fda0c4c9
-
SHA256
0a6d6dd0286b03d733720371a5b9ffd6cb008bcc8f67d07806a470e159798c30
-
SHA512
17206ef6db20567d2c5a888ba9c3e0b089ca54c52dc54b1433136322087a6661c23979e6ab3341826f811a8f295eedf4ce54adc54f8bdfb3f8dcf3f7e15cb4c2
-
SSDEEP
98304:2geSX8FPrOJFSk1SB2f8y+QeIJd2TsH2t2aTnPBPnEAEf2OQWd+bYt:xeE88JgV2fDehYsPzREAY2OQZbK
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1