General

  • Target

    67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a.exe

  • Size

    2.8MB

  • Sample

    241123-va138axrd1

  • MD5

    c700c8b1afa60ef0076fea819805a382

  • SHA1

    4006e4e686fbe9e57401925e252b981e5303506c

  • SHA256

    67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a

  • SHA512

    67293cc96f0fe03c211bc8dd009023fb0bf079b53888eace944d576fe523894e9ea80dddeac2b6cec1a098e001fce6bdf81d247af4d16476353bb51656c7b670

  • SSDEEP

    49152:uZmp6X09Ht+USUU5nw9hcG9qY0EQSvFxgkRD+N1Yq21u8iVh//xsIyBdX3WSH:j6XUt+UvwWhIYmkxgAuS1ib3CbG6

Malware Config

Targets

    • Target

      67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a.exe

    • Size

      2.8MB

    • MD5

      c700c8b1afa60ef0076fea819805a382

    • SHA1

      4006e4e686fbe9e57401925e252b981e5303506c

    • SHA256

      67d193493ae331bfeec5924058e74e4e9b2a6c50cff7b7b46b2b40b67e52015a

    • SHA512

      67293cc96f0fe03c211bc8dd009023fb0bf079b53888eace944d576fe523894e9ea80dddeac2b6cec1a098e001fce6bdf81d247af4d16476353bb51656c7b670

    • SSDEEP

      49152:uZmp6X09Ht+USUU5nw9hcG9qY0EQSvFxgkRD+N1Yq21u8iVh//xsIyBdX3WSH:j6XUt+UvwWhIYmkxgAuS1ib3CbG6

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks