General

  • Target

    SecuriteInfo.com.Trojan.Packed2.42809.7351.27535

  • Size

    1015KB

  • Sample

    210122-92xm8sbyg6

  • MD5

    f42d95af9e81a4dc5b7e15697c2a3081

  • SHA1

    898e81497dcef6b279f8d06f8603c64633a6f87f

  • SHA256

    1c98302d6415cd9883b303616605288cfe63ab1dd8a287c026fb18dacbfd5c98

  • SHA512

    3d417f64475e91efa9d97291db4766492618050d1ff4169bb5ec0f6e60810f32c043b5dc54440d91f225909a0b85162991598ffc917038ce26ca3bd92bcd1a98

Score
9/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.Packed2.42809.7351.27535

    • Size

      1015KB

    • MD5

      f42d95af9e81a4dc5b7e15697c2a3081

    • SHA1

      898e81497dcef6b279f8d06f8603c64633a6f87f

    • SHA256

      1c98302d6415cd9883b303616605288cfe63ab1dd8a287c026fb18dacbfd5c98

    • SHA512

      3d417f64475e91efa9d97291db4766492618050d1ff4169bb5ec0f6e60810f32c043b5dc54440d91f225909a0b85162991598ffc917038ce26ca3bd92bcd1a98

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks