General

  • Target

    d35f8425288d1b67729d6ab147a1ab72c445a1d690aa255abb5f261c36d3d06bN

  • Size

    3.5MB

  • Sample

    241002-nalvzasgmj

  • MD5

    67c0aff6e5f0091014edfc4f8a8c2510

  • SHA1

    1c54f3e26a53329b5a9e08095920c8b1fcbf1162

  • SHA256

    d35f8425288d1b67729d6ab147a1ab72c445a1d690aa255abb5f261c36d3d06b

  • SHA512

    6770210ae8ff38a75c2165154bfdfabc1cdee3b010433574c66b6e15b403b7efe5ef1d68d15eb6fdf607af7c4790f129654269ef320b43f227d380a561aacb20

  • SSDEEP

    98304:DHWc32neRZlx0xCcYjnjH/90Ph3iNnmfBPJ3PDM+mb9/y0:DhGnOZlnjjH/90cnmpPTs9/

Malware Config

Targets

    • Target

      d35f8425288d1b67729d6ab147a1ab72c445a1d690aa255abb5f261c36d3d06bN

    • Size

      3.5MB

    • MD5

      67c0aff6e5f0091014edfc4f8a8c2510

    • SHA1

      1c54f3e26a53329b5a9e08095920c8b1fcbf1162

    • SHA256

      d35f8425288d1b67729d6ab147a1ab72c445a1d690aa255abb5f261c36d3d06b

    • SHA512

      6770210ae8ff38a75c2165154bfdfabc1cdee3b010433574c66b6e15b403b7efe5ef1d68d15eb6fdf607af7c4790f129654269ef320b43f227d380a561aacb20

    • SSDEEP

      98304:DHWc32neRZlx0xCcYjnjH/90Ph3iNnmfBPJ3PDM+mb9/y0:DhGnOZlnjjH/90cnmpPTs9/

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks