General

  • Target

    Permanent.exe

  • Size

    28.7MB

  • Sample

    241121-p6ay1sslgv

  • MD5

    a8ea20e52b270a5bbbbd147d11e76f57

  • SHA1

    1c8b349a5316af6be44aa63b341c6d79d3d0003e

  • SHA256

    6b62e76dac003555c1d9f4852cdec2e1680939262dcf492c95e78fd7cad39f54

  • SHA512

    1c875d43e554049fbd04ebbfa2839e4089aa4855a070e25c6b0b6f9406bda4fad2bc8a7f27120cd0e55ecb54394e5882c40cbab68ff454afe370ddbf0f335f31

  • SSDEEP

    786432:ChMu4Vl8Z27SzBW81y3hrL0TXMb8Z17Z9/CVvSWsb7o:UMy22zBW93hrwTcuI567o

Malware Config

Targets

    • Target

      Permanent.exe

    • Size

      28.7MB

    • MD5

      a8ea20e52b270a5bbbbd147d11e76f57

    • SHA1

      1c8b349a5316af6be44aa63b341c6d79d3d0003e

    • SHA256

      6b62e76dac003555c1d9f4852cdec2e1680939262dcf492c95e78fd7cad39f54

    • SHA512

      1c875d43e554049fbd04ebbfa2839e4089aa4855a070e25c6b0b6f9406bda4fad2bc8a7f27120cd0e55ecb54394e5882c40cbab68ff454afe370ddbf0f335f31

    • SSDEEP

      786432:ChMu4Vl8Z27SzBW81y3hrL0TXMb8Z17Z9/CVvSWsb7o:UMy22zBW93hrwTcuI567o

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks