General

  • Target

    STA_Injector.exe

  • Size

    14.6MB

  • Sample

    240428-jjdthabc3x

  • MD5

    4b37038e39723ca08eed6779d8f7ddac

  • SHA1

    62e8c777c5533bbdda57934b424a4d72828da725

  • SHA256

    267dd6abe4f5c53c1523b1624a4832347111c6853820b69cbda714d0297b5799

  • SHA512

    b06f9db8d481f4207ae6134b9df48c8703be034cab716ddcd66edf0232474b682a82e434a99cb4f81eba5975e6705e0fcb5637a2d1a34f504fd814f5218906ca

  • SSDEEP

    393216:p1POOy8WFpDUE5d73an0r1mLZYuXxA+Vwu/Nqkr4oeUpfV:pHwDUE5dTz1O+qA+Vwu/o24oeit

Malware Config

Targets

    • Target

      STA_Injector.exe

    • Size

      14.6MB

    • MD5

      4b37038e39723ca08eed6779d8f7ddac

    • SHA1

      62e8c777c5533bbdda57934b424a4d72828da725

    • SHA256

      267dd6abe4f5c53c1523b1624a4832347111c6853820b69cbda714d0297b5799

    • SHA512

      b06f9db8d481f4207ae6134b9df48c8703be034cab716ddcd66edf0232474b682a82e434a99cb4f81eba5975e6705e0fcb5637a2d1a34f504fd814f5218906ca

    • SSDEEP

      393216:p1POOy8WFpDUE5d73an0r1mLZYuXxA+Vwu/Nqkr4oeUpfV:pHwDUE5dTz1O+qA+Vwu/o24oeit

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks