1979d07792f6dbbdfda182b81adca3d5f19f87422fc70754a5989a1afb659c1b (SHA-256)

Malicious with 100% Confidence 

SecondWrite’s DeepView Sandbox analyzed this file – a Windows PE32 Executable – this week and declared it to be malicious.  DeepView unique and patented methods identified 4 indicators – specifically force code execution (FCE) and automatic sequence detection (ASD).  

A link to the full report with descriptions and details is below.  Some key highlights and indicators follow.  

Type of Malware:  BOT

  • Drops a binary and executes it
  • [FCE] Deletes its original binary from disk 
  • Creates a slightly modified copy of itself
  • Creates executable files on the filesystem
  • Presents an Authenticode digital signature

Evasiveness Indicators:

  • [FCE] Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available process attempted to delay the analysis task
  • [FCE] Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task

Other Compelling Indicators:

  • [ASD] Automatic Sequence Detection maliciousness score: 68%
  • Performs some DNS requests
  • Anomalous binary characteristics
  • Repeatedly searches for a not-found process, you may want to run a web browser during analysis 
  • Reads data out of its own binary image

MITRE ATT&CK Indicators:

MITRE TacticMITRE Technique
Command and ControlRemote File Copy
Lateral MovementRemote File Copy
DiscoveryProcess DiscoveryVirtualization / Sandbox Evasion
Defense EvasionSoftware PackingFile DeletionDisabling Security ToolsVirtualization / Sandbox Evasion

Selection from The Report:

See Full Detailed Report:

Malware Of The Week is sourced by DeepView Sandbox using SecondWrite’s patented techniques of Forced Code Execution, Program Level Indicators, and Automatic Sequence Detection.