General

  • Target

    Unconfirmed 223130.crdownload

  • Size

    972KB

  • Sample

    241123-yy4qsstpg1

  • MD5

    90fd25ced85fe6db28d21ae7d1f02e2c

  • SHA1

    e27eff4cd4d383f5c564cce2bd1aaa2ffe4ec056

  • SHA256

    97572bd57b08b59744e4dfe6f93fb96be4002dfe1aa78683771725401776464f

  • SHA512

    1c775cf8dfde037eaa98eb14088c70d74923f0f6a83030a71f2f4c1a4453f6154dab7a4aa175e429860badda3e5e0ae226f3c3e8171332f5962bf36f8aa073fa

  • SSDEEP

    24576:DIbp4sZotkNjFC/4qxp+k+kPFoHZvPrSMc:cvotkNjg/lhqZvG

Malware Config

Targets

    • Target

      Unconfirmed 223130.crdownload

    • Size

      972KB

    • MD5

      90fd25ced85fe6db28d21ae7d1f02e2c

    • SHA1

      e27eff4cd4d383f5c564cce2bd1aaa2ffe4ec056

    • SHA256

      97572bd57b08b59744e4dfe6f93fb96be4002dfe1aa78683771725401776464f

    • SHA512

      1c775cf8dfde037eaa98eb14088c70d74923f0f6a83030a71f2f4c1a4453f6154dab7a4aa175e429860badda3e5e0ae226f3c3e8171332f5962bf36f8aa073fa

    • SSDEEP

      24576:DIbp4sZotkNjFC/4qxp+k+kPFoHZvPrSMc:cvotkNjg/lhqZvG

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: currency-file@1

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Blocklisted process makes network request

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks