General

  • Target

    53872486f6a0e670c56ea429efbae2f9f10a069d14d2d81d4fe912f93bd93122

  • Size

    4.9MB

  • Sample

    240629-vxz5fa1hrf

  • MD5

    b62faba65f290de7c587f43ebda120ba

  • SHA1

    00d59a2df765b389738e5f18e5d6a9aae712efd3

  • SHA256

    53872486f6a0e670c56ea429efbae2f9f10a069d14d2d81d4fe912f93bd93122

  • SHA512

    49dd1bafdcfc1700bbb450c7f4ccd9e4170c0e7f09efc0d9fb705e3367d4abc3289318ee4c3d58f44b55451d5fb8e8a516ab122963c22d7ded875c6f99f224c2

  • SSDEEP

    98304:fgtyjBizTawBjICfmlDeFPgM3I+yxmLZy6+lcX0uj4AV:fgtKBaewWomlSiM3exIZklcku

Malware Config

Targets

    • Target

      53872486f6a0e670c56ea429efbae2f9f10a069d14d2d81d4fe912f93bd93122

    • Size

      4.9MB

    • MD5

      b62faba65f290de7c587f43ebda120ba

    • SHA1

      00d59a2df765b389738e5f18e5d6a9aae712efd3

    • SHA256

      53872486f6a0e670c56ea429efbae2f9f10a069d14d2d81d4fe912f93bd93122

    • SHA512

      49dd1bafdcfc1700bbb450c7f4ccd9e4170c0e7f09efc0d9fb705e3367d4abc3289318ee4c3d58f44b55451d5fb8e8a516ab122963c22d7ded875c6f99f224c2

    • SSDEEP

      98304:fgtyjBizTawBjICfmlDeFPgM3I+yxmLZy6+lcX0uj4AV:fgtKBaewWomlSiM3exIZklcku

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks