General

  • Target

    9e76651a091ad8d582fa685e9835a249c19eb0d7f515a1dd45d3af3f8a63245e

  • Size

    2.5MB

  • Sample

    241009-bynm9aygkq

  • MD5

    9fec10aaef030a2ff4adfcaec802119e

  • SHA1

    0f9e6cf0093c4a53eff46f62c4294de9715f284f

  • SHA256

    9e76651a091ad8d582fa685e9835a249c19eb0d7f515a1dd45d3af3f8a63245e

  • SHA512

    eb61921286847f777a0814c713313eca9e7085b93d453f93172b51fb77de0e8ae3b827c315a4ef0b525b6c5364e2d859c445dcefb974cf656871e4224b01deea

  • SSDEEP

    49152:XxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyx4:Xxx9NUFkQx753uWuCyyx4

Malware Config

Targets

    • Target

      9e76651a091ad8d582fa685e9835a249c19eb0d7f515a1dd45d3af3f8a63245e

    • Size

      2.5MB

    • MD5

      9fec10aaef030a2ff4adfcaec802119e

    • SHA1

      0f9e6cf0093c4a53eff46f62c4294de9715f284f

    • SHA256

      9e76651a091ad8d582fa685e9835a249c19eb0d7f515a1dd45d3af3f8a63245e

    • SHA512

      eb61921286847f777a0814c713313eca9e7085b93d453f93172b51fb77de0e8ae3b827c315a4ef0b525b6c5364e2d859c445dcefb974cf656871e4224b01deea

    • SSDEEP

      49152:XxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyx4:Xxx9NUFkQx753uWuCyyx4

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks