General

  • Target

    9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a

  • Size

    9.8MB

  • Sample

    241031-j7arravdrk

  • MD5

    ffec6ce9f5f9534086076195e95eefa3

  • SHA1

    0020fa2285a9bae44ebf4f856116d9ce7df66881

  • SHA256

    9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a

  • SHA512

    6b37a0d62828634bd2b73ecb8b941b24e282966285ec96a93abe04159e6cb287449ef45fa0361dfc0d40e337d7400702a7bc46faa94b8d4cad261551090067f8

  • SSDEEP

    196608:oA74Kf5o0+HhRGI6lhOv4mNp//e+cVJc8tfR3ZE+S:oUqhkI6lhZmjZcVJBBZc

Malware Config

Targets

    • Target

      9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a

    • Size

      9.8MB

    • MD5

      ffec6ce9f5f9534086076195e95eefa3

    • SHA1

      0020fa2285a9bae44ebf4f856116d9ce7df66881

    • SHA256

      9dc96fcf5f80c40d27f9416d74420f334bd54920547dbad8ea66463fe440d12a

    • SHA512

      6b37a0d62828634bd2b73ecb8b941b24e282966285ec96a93abe04159e6cb287449ef45fa0361dfc0d40e337d7400702a7bc46faa94b8d4cad261551090067f8

    • SSDEEP

      196608:oA74Kf5o0+HhRGI6lhOv4mNp//e+cVJc8tfR3ZE+S:oUqhkI6lhZmjZcVJBBZc

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks