General

  • Target

    bat.win_external.exe

  • Size

    4.2MB

  • Sample

    240428-emg8waga6x

  • MD5

    3a15201746d47d11f659d8848fc71574

  • SHA1

    c759fd19df4a289d2d3b251f822220e2ea9df57c

  • SHA256

    4188d2de2935e9adc6b37dcc1619e9392a3b3d44f019af87a1b5ad151f4df87d

  • SHA512

    7c9479b5260cc88a0f7b9d7f46fbd4f9c7c1f5c882fb270892f3a2c49a9fada0245c234ac9c65d61500560533345c61447bd67f7f44114234dd8ad22e329c00a

  • SSDEEP

    98304:/fsr5evYrZ6ujAIE/2jc+xKijsunRMqEd/oWwBVv:8j6ujtE/GcSK+hn+qw7wB5

Malware Config

Targets

    • Target

      bat.win_external.exe

    • Size

      4.2MB

    • MD5

      3a15201746d47d11f659d8848fc71574

    • SHA1

      c759fd19df4a289d2d3b251f822220e2ea9df57c

    • SHA256

      4188d2de2935e9adc6b37dcc1619e9392a3b3d44f019af87a1b5ad151f4df87d

    • SHA512

      7c9479b5260cc88a0f7b9d7f46fbd4f9c7c1f5c882fb270892f3a2c49a9fada0245c234ac9c65d61500560533345c61447bd67f7f44114234dd8ad22e329c00a

    • SSDEEP

      98304:/fsr5evYrZ6ujAIE/2jc+xKijsunRMqEd/oWwBVv:8j6ujtE/GcSK+hn+qw7wB5

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks