General

  • Target

    b45668e08c03024f2432ff332c319131.exe

  • Size

    3.4MB

  • Sample

    241103-hbbhqsxfrl

  • MD5

    b45668e08c03024f2432ff332c319131

  • SHA1

    4bef9109eaeace4107c47858eef2d9d3487e45f0

  • SHA256

    4b5a876b1c230b28c0862d5f8158b3657016709855bf3329d8fea6cada3adbfe

  • SHA512

    538c8471fc0313e68885d4d09140ec3e3374af3464af626195b6387a67b9bae9c3c9fd369d9dc7965decc182d13e8bbf95b4cf96b5ffc78af5d7904d59325bbc

  • SSDEEP

    98304:MHKnK7qkC+8TMGHgWnvLBQ0YXpS3KZFc6LUARABDgAj:MqKYx9zu0YpSaZFcJA6BDga

Malware Config

Targets

    • Target

      b45668e08c03024f2432ff332c319131.exe

    • Size

      3.4MB

    • MD5

      b45668e08c03024f2432ff332c319131

    • SHA1

      4bef9109eaeace4107c47858eef2d9d3487e45f0

    • SHA256

      4b5a876b1c230b28c0862d5f8158b3657016709855bf3329d8fea6cada3adbfe

    • SHA512

      538c8471fc0313e68885d4d09140ec3e3374af3464af626195b6387a67b9bae9c3c9fd369d9dc7965decc182d13e8bbf95b4cf96b5ffc78af5d7904d59325bbc

    • SSDEEP

      98304:MHKnK7qkC+8TMGHgWnvLBQ0YXpS3KZFc6LUARABDgAj:MqKYx9zu0YpSaZFcJA6BDga

    • Detects ZharkBot payload

      ZharkBot is a botnet written C++.

    • ZharkBot

      ZharkBot is a botnet written C++.

    • Zharkbot family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks