General

  • Target

    51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57

  • Size

    3.7MB

  • Sample

    241123-2f53pazmhy

  • MD5

    3b53beda7cd09fdc8588a7f0633001cf

  • SHA1

    ea234ddc0b0bccc03bee0e945063ff4387e23f98

  • SHA256

    51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57

  • SHA512

    2baa4509102ef94f2612200eb8bf9ca89d014b2e35fef379be39fec745278a1e0441e020df834dbe1f60800cc219d59ca31705e1c7c068d4c9f6194e2047aabc

  • SSDEEP

    98304:m+szMRjF1eZVGgF8hRiEsU888SLA781uZ03HJRkh:7s2eZQUyAEv888aAyJwh

Malware Config

Targets

    • Target

      51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57

    • Size

      3.7MB

    • MD5

      3b53beda7cd09fdc8588a7f0633001cf

    • SHA1

      ea234ddc0b0bccc03bee0e945063ff4387e23f98

    • SHA256

      51453e4e45f46ab5c073e82618715738aeadc1d88dc84430b3d8934c81453d57

    • SHA512

      2baa4509102ef94f2612200eb8bf9ca89d014b2e35fef379be39fec745278a1e0441e020df834dbe1f60800cc219d59ca31705e1c7c068d4c9f6194e2047aabc

    • SSDEEP

      98304:m+szMRjF1eZVGgF8hRiEsU888SLA781uZ03HJRkh:7s2eZQUyAEv888aAyJwh

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks