General

  • Target

    a424b8b1bb9d04f10ff81731d7aac690d82e0651b4d3d611811f51054699b695

  • Size

    6.0MB

  • Sample

    241014-d2td1s1hql

  • MD5

    79915ceaf5c5fec93c7e5473337bac0b

  • SHA1

    e18dd59020d1b122812679db9936c1c6ea99d9a2

  • SHA256

    a424b8b1bb9d04f10ff81731d7aac690d82e0651b4d3d611811f51054699b695

  • SHA512

    3ac16180e66a4b92c3fe0c94e86ec16d0e561d4464eb8da007b29c62e78f64410bc9d53f4e5d4128da5d18e2e79c5605a11151870c5399bcaa63ac8b950b94c4

  • SSDEEP

    98304:XNO/UWZ9+12HlCz784sLSxuHRogpOzbngV/1pV5BqlafdJFLAaLP1X:XKX+267IauxogpGbgPbqlafFPTZ

Malware Config

Targets

    • Target

      a424b8b1bb9d04f10ff81731d7aac690d82e0651b4d3d611811f51054699b695

    • Size

      6.0MB

    • MD5

      79915ceaf5c5fec93c7e5473337bac0b

    • SHA1

      e18dd59020d1b122812679db9936c1c6ea99d9a2

    • SHA256

      a424b8b1bb9d04f10ff81731d7aac690d82e0651b4d3d611811f51054699b695

    • SHA512

      3ac16180e66a4b92c3fe0c94e86ec16d0e561d4464eb8da007b29c62e78f64410bc9d53f4e5d4128da5d18e2e79c5605a11151870c5399bcaa63ac8b950b94c4

    • SSDEEP

      98304:XNO/UWZ9+12HlCz784sLSxuHRogpOzbngV/1pV5BqlafdJFLAaLP1X:XKX+267IauxogpGbgPbqlafFPTZ

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks