General

  • Target

    BIGBOSS.exe

  • Size

    36.6MB

  • Sample

    250118-v2569aypgz

  • MD5

    19773de3aada9bebac1c8a284059e0a5

  • SHA1

    482dcb8326ab158a0b054516cede9d80119dca7b

  • SHA256

    4400ba385c37b8c0ec3c63463794c2a335fe8823a0a43a910ae6400337371217

  • SHA512

    829ee42d011ca1064a272fc626540b5ddf115d1e59e8e107b185def9ced215b96ce3018c7ff4a8a6c30893e313c64e1df58e7771e1d2f868fcfa61c7ecd56346

  • SSDEEP

    786432:w5iyxGxoo4kxSjEN0CgFjaj2G8NkzJD4pSbN+WYbO7fqffK:w01xoLvCgxayG8NkzJDaSbN+WY8qffK

Malware Config

Targets

    • Target

      BIGBOSS.exe

    • Size

      36.6MB

    • MD5

      19773de3aada9bebac1c8a284059e0a5

    • SHA1

      482dcb8326ab158a0b054516cede9d80119dca7b

    • SHA256

      4400ba385c37b8c0ec3c63463794c2a335fe8823a0a43a910ae6400337371217

    • SHA512

      829ee42d011ca1064a272fc626540b5ddf115d1e59e8e107b185def9ced215b96ce3018c7ff4a8a6c30893e313c64e1df58e7771e1d2f868fcfa61c7ecd56346

    • SSDEEP

      786432:w5iyxGxoo4kxSjEN0CgFjaj2G8NkzJD4pSbN+WYbO7fqffK:w01xoLvCgxayG8NkzJDaSbN+WY8qffK

    • AxBanker

      AxBanker is an Android banking trojan that targets bank customers information distributed through fake bank applications.

    • Axbanker family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks