General

  • Target

    c7465f1732610d442228a422d7521fdf475f0707f6ff1cc28ea3cc7b7477911dN

  • Size

    2.5MB

  • Sample

    241010-qj5qjssfpk

  • MD5

    99ada45342214680ac3d2bde8dc00680

  • SHA1

    2a03e4d3b3e3e0520bd9b662a519064cb7ace5ad

  • SHA256

    c7465f1732610d442228a422d7521fdf475f0707f6ff1cc28ea3cc7b7477911d

  • SHA512

    85954a4c8f4487123154c97ad6043b4c68844dcb9358075cfbc150663fad8709ab9ac3b4a0e19e8875feb19f173bfeabf630e750db553fdd9ed43bff64f13dac

  • SSDEEP

    49152:8xmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyx8:8xx9NUFkQx753uWuCyyx8

Malware Config

Targets

    • Target

      c7465f1732610d442228a422d7521fdf475f0707f6ff1cc28ea3cc7b7477911dN

    • Size

      2.5MB

    • MD5

      99ada45342214680ac3d2bde8dc00680

    • SHA1

      2a03e4d3b3e3e0520bd9b662a519064cb7ace5ad

    • SHA256

      c7465f1732610d442228a422d7521fdf475f0707f6ff1cc28ea3cc7b7477911d

    • SHA512

      85954a4c8f4487123154c97ad6043b4c68844dcb9358075cfbc150663fad8709ab9ac3b4a0e19e8875feb19f173bfeabf630e750db553fdd9ed43bff64f13dac

    • SSDEEP

      49152:8xmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyx8:8xx9NUFkQx753uWuCyyx8

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks