General

  • Target

    a1c0cf13e6d6ec991aa0a254a41e6f0eee050c22d6ec17672be746ed046d7e4f

  • Size

    2.5MB

  • Sample

    241101-webvkavmdp

  • MD5

    b551e18a01e757ece82417fce15c9159

  • SHA1

    e6d9d144614bdec105a38a40fad0db7085355d4a

  • SHA256

    a1c0cf13e6d6ec991aa0a254a41e6f0eee050c22d6ec17672be746ed046d7e4f

  • SHA512

    337fb83b11d73bc652950e800ffea222bd3350acfbdc135b683a4d8366ad97b897e4eacda384145546e47408d69db6266d6d731f2d1fa2400a175225b8054401

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxU:Mxx9NUFkQx753uWuCyyxU

Malware Config

Targets

    • Target

      a1c0cf13e6d6ec991aa0a254a41e6f0eee050c22d6ec17672be746ed046d7e4f

    • Size

      2.5MB

    • MD5

      b551e18a01e757ece82417fce15c9159

    • SHA1

      e6d9d144614bdec105a38a40fad0db7085355d4a

    • SHA256

      a1c0cf13e6d6ec991aa0a254a41e6f0eee050c22d6ec17672be746ed046d7e4f

    • SHA512

      337fb83b11d73bc652950e800ffea222bd3350acfbdc135b683a4d8366ad97b897e4eacda384145546e47408d69db6266d6d731f2d1fa2400a175225b8054401

    • SSDEEP

      49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxU:Mxx9NUFkQx753uWuCyyxU

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks