General

  • Target

    117f9a7ea26b7767f2aff91cbcb5272a1dc408243b2bdddb629721b95438cdaa

  • Size

    11.7MB

  • Sample

    241014-d3qdrasajm

  • MD5

    638f69db2509826be49c311be75fc5fd

  • SHA1

    7554558ee5fd983bc09fa95c3186012e9350f9bc

  • SHA256

    117f9a7ea26b7767f2aff91cbcb5272a1dc408243b2bdddb629721b95438cdaa

  • SHA512

    8cd5e7047b317e8ef8235e6c7bd8958c1ae4f1e85173edd6de1d723b6d83bfe6d62bbe562098cf8f8b497e6da32ff1eeb36413e1b7cda1d129c409db722510a5

  • SSDEEP

    196608:/8b201UBc3Dgp/O/gfTTVFG/2r33PXu6pCBjg5hDrEQSJr3vm2r+9lHEGHddQtUv:/Ogsf/kTTVk/2r3pscDQb/rrcHEiQtC

Malware Config

Targets

    • Target

      117f9a7ea26b7767f2aff91cbcb5272a1dc408243b2bdddb629721b95438cdaa

    • Size

      11.7MB

    • MD5

      638f69db2509826be49c311be75fc5fd

    • SHA1

      7554558ee5fd983bc09fa95c3186012e9350f9bc

    • SHA256

      117f9a7ea26b7767f2aff91cbcb5272a1dc408243b2bdddb629721b95438cdaa

    • SHA512

      8cd5e7047b317e8ef8235e6c7bd8958c1ae4f1e85173edd6de1d723b6d83bfe6d62bbe562098cf8f8b497e6da32ff1eeb36413e1b7cda1d129c409db722510a5

    • SSDEEP

      196608:/8b201UBc3Dgp/O/gfTTVFG/2r33PXu6pCBjg5hDrEQSJr3vm2r+9lHEGHddQtUv:/Ogsf/kTTVk/2r3pscDQb/rrcHEiQtC

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks