General
-
Target
4a94cb3b8694baaa65d24769fcccf890c8dfd3a8ce2e187bed58b926563c1cdc.msi.vir
-
Size
35.8MB
-
Sample
241119-rgf5vawqcv
-
MD5
09e49ede1ae81b8193683bdb8a74394c
-
SHA1
f1ba4ab8c9f5cf3a6f4642e4e1e5f100bc50a939
-
SHA256
4a94cb3b8694baaa65d24769fcccf890c8dfd3a8ce2e187bed58b926563c1cdc
-
SHA512
11e4dbc34573c66de90b9a2785fd7b85c4931ce86bd2001bf86d7a5869835b3ebc7c2ed0cfee6731ec8acd58195470db46d43c5ea473e44e569ad1438e9164d5
-
SSDEEP
786432:bMf7E/aq2GdHnewtdV5Kout5tyDQuA6xGbdu91PLu6Oimm/Kc5:bOA/aq7lnewtdVFK5tykoxYgDvmm/l5
Static task
static1
Behavioral task
behavioral1
Sample
4a94cb3b8694baaa65d24769fcccf890c8dfd3a8ce2e187bed58b926563c1cdc.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4a94cb3b8694baaa65d24769fcccf890c8dfd3a8ce2e187bed58b926563c1cdc.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4a94cb3b8694baaa65d24769fcccf890c8dfd3a8ce2e187bed58b926563c1cdc.msi.vir
-
Size
35.8MB
-
MD5
09e49ede1ae81b8193683bdb8a74394c
-
SHA1
f1ba4ab8c9f5cf3a6f4642e4e1e5f100bc50a939
-
SHA256
4a94cb3b8694baaa65d24769fcccf890c8dfd3a8ce2e187bed58b926563c1cdc
-
SHA512
11e4dbc34573c66de90b9a2785fd7b85c4931ce86bd2001bf86d7a5869835b3ebc7c2ed0cfee6731ec8acd58195470db46d43c5ea473e44e569ad1438e9164d5
-
SSDEEP
786432:bMf7E/aq2GdHnewtdV5Kout5tyDQuA6xGbdu91PLu6Oimm/Kc5:bOA/aq7lnewtdVFK5tykoxYgDvmm/l5
-
Blackmoon family
-
Detect Blackmoon payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies Windows Firewall
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Msiexec
1Virtualization/Sandbox Evasion
1