General

  • Target

    suspal.exe

  • Size

    15.1MB

  • Sample

    241003-at3qyaydph

  • MD5

    0a248e00d9f3999b03c8353ec80ab8e9

  • SHA1

    e3a5b0a07cf077bdffc44fe0c29b8ef32d832126

  • SHA256

    fe04f4bf0e57120148e49b67e1860f329f3ce5aade47f05e7c8a1d64e1816dca

  • SHA512

    4762495bce3e8d7e2806208aad69dccb7d7f7545df581050142579f60fa7ee986141fd12dbef89c64544b07311dd87430a91a606d4751077840b19b3af92ba6e

  • SSDEEP

    393216:FTMPFy6utYG43mbtgsAQxQX3OBkTEzhMJCM8J:9MPI6ua3vsEOBkTCYK

Malware Config

Targets

    • Target

      suspal.exe

    • Size

      15.1MB

    • MD5

      0a248e00d9f3999b03c8353ec80ab8e9

    • SHA1

      e3a5b0a07cf077bdffc44fe0c29b8ef32d832126

    • SHA256

      fe04f4bf0e57120148e49b67e1860f329f3ce5aade47f05e7c8a1d64e1816dca

    • SHA512

      4762495bce3e8d7e2806208aad69dccb7d7f7545df581050142579f60fa7ee986141fd12dbef89c64544b07311dd87430a91a606d4751077840b19b3af92ba6e

    • SSDEEP

      393216:FTMPFy6utYG43mbtgsAQxQX3OBkTEzhMJCM8J:9MPI6ua3vsEOBkTCYK

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks