General

  • Target

    9943c96740e6943e01e387e7757728b5.bin

  • Size

    13KB

  • Sample

    240630-dg7e5ssgqg

  • MD5

    9943c96740e6943e01e387e7757728b5

  • SHA1

    ce76709ee92aff81a307b396f22ba69c8593d550

  • SHA256

    d0a6febf77a86a2c669b04884ffeff2bc4d3eccf31710e66b326c68a6d1c7870

  • SHA512

    58f003f52cb93bed058c4f1dc6b91632e778c02eb47aeb159ab2d5f18b478bea6baacd447800684af146ed385925ebb360e886d45280d755e5723b447eec2c7e

  • SSDEEP

    192:+eoG9CpgyKYSsaqaLHmr8XK30ifnTs1mHi8jd:HCprtaqayKKEifA1mVj

Malware Config

Targets

    • Target

      9943c96740e6943e01e387e7757728b5.bin

    • Size

      13KB

    • MD5

      9943c96740e6943e01e387e7757728b5

    • SHA1

      ce76709ee92aff81a307b396f22ba69c8593d550

    • SHA256

      d0a6febf77a86a2c669b04884ffeff2bc4d3eccf31710e66b326c68a6d1c7870

    • SHA512

      58f003f52cb93bed058c4f1dc6b91632e778c02eb47aeb159ab2d5f18b478bea6baacd447800684af146ed385925ebb360e886d45280d755e5723b447eec2c7e

    • SSDEEP

      192:+eoG9CpgyKYSsaqaLHmr8XK30ifnTs1mHi8jd:HCprtaqayKKEifA1mVj

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks