General

  • Target

    f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin

  • Size

    3.8MB

  • Sample

    200721-2ftkressa6

  • MD5

    79a7de437dad73c33490fc8dd3f9d6c5

  • SHA1

    3ebd89f9bf858ae9f6d460fde0875ef2061c8535

  • SHA256

    f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0

  • SHA512

    152990cbc3ccf22d08326a2e5f58cb0f8c96f7d5e20a82a90b894061df85cef800b6e26ee325ced9cea468e7f83fee3f6a6277efdb7d95db81f6517e824e0f73

Score
9/10

Malware Config

Targets

    • Target

      f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin

    • Size

      3.8MB

    • MD5

      79a7de437dad73c33490fc8dd3f9d6c5

    • SHA1

      3ebd89f9bf858ae9f6d460fde0875ef2061c8535

    • SHA256

      f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0

    • SHA512

      152990cbc3ccf22d08326a2e5f58cb0f8c96f7d5e20a82a90b894061df85cef800b6e26ee325ced9cea468e7f83fee3f6a6277efdb7d95db81f6517e824e0f73

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks