General

  • Target

    AV-Free Spoofer (1).rar

  • Size

    8.5MB

  • Sample

    241203-txhdysymgl

  • MD5

    e9db8de6465917b32c7c911df0bdf762

  • SHA1

    807600ec249fa23dff95cef3a51025af06a98463

  • SHA256

    58dfb382f8cd93e1a396182d569afdb54d2cffda09c3ad2b96b11fb14010384c

  • SHA512

    4eab01c4bad11c3cd7dae37d5191690a0aec7f97776d03575957dc4e6776e5da5242f3a02b66bd44d179b02504d17f33f621b6581706876878e81ce03ca93c1b

  • SSDEEP

    196608:7Mw14vzVwzvsL+zQ/cZve6lMfbbRslssV/YU:ArqzvsL+zQ0ZvmFOlYU

Malware Config

Targets

    • Target

      AV-Free Spoofer (1).rar

    • Size

      8.5MB

    • MD5

      e9db8de6465917b32c7c911df0bdf762

    • SHA1

      807600ec249fa23dff95cef3a51025af06a98463

    • SHA256

      58dfb382f8cd93e1a396182d569afdb54d2cffda09c3ad2b96b11fb14010384c

    • SHA512

      4eab01c4bad11c3cd7dae37d5191690a0aec7f97776d03575957dc4e6776e5da5242f3a02b66bd44d179b02504d17f33f621b6581706876878e81ce03ca93c1b

    • SSDEEP

      196608:7Mw14vzVwzvsL+zQ/cZve6lMfbbRslssV/YU:ArqzvsL+zQ0ZvmFOlYU

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks