General

  • Target

    94e4e8b432c9b4e92b0947ba012a9cee8485d7e68d2e0010fc73217cd8258317N

  • Size

    1.1MB

  • Sample

    241012-mcp5qszeql

  • MD5

    209f1ae8c9fbd77b44117c900814bfe0

  • SHA1

    94b0857f5cbbfa7fa669229bea0b818b0f86bf36

  • SHA256

    94e4e8b432c9b4e92b0947ba012a9cee8485d7e68d2e0010fc73217cd8258317

  • SHA512

    92db045d882029b45667002910798f16bf86b540fe0ff1e162cd7c352b18fdfa40f46fb269da422c070fa4cfebcca494bb67bcccd40a94f0e5752a5298b46012

  • SSDEEP

    24576:a9uaDyM3MU5sPYhkzqKietCBZLbrvKH43NKYJLWYJL:a9OM3sUk+KUnrvKH4YYFWYF

Malware Config

Targets

    • Target

      94e4e8b432c9b4e92b0947ba012a9cee8485d7e68d2e0010fc73217cd8258317N

    • Size

      1.1MB

    • MD5

      209f1ae8c9fbd77b44117c900814bfe0

    • SHA1

      94b0857f5cbbfa7fa669229bea0b818b0f86bf36

    • SHA256

      94e4e8b432c9b4e92b0947ba012a9cee8485d7e68d2e0010fc73217cd8258317

    • SHA512

      92db045d882029b45667002910798f16bf86b540fe0ff1e162cd7c352b18fdfa40f46fb269da422c070fa4cfebcca494bb67bcccd40a94f0e5752a5298b46012

    • SSDEEP

      24576:a9uaDyM3MU5sPYhkzqKietCBZLbrvKH43NKYJLWYJL:a9OM3sUk+KUnrvKH4YYFWYF

    • UAC bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks