General

  • Target

    malware_sfx_v2.exe

  • Size

    11.7MB

  • Sample

    210421-bgsvtxnyqx

  • MD5

    19c56bb998234db3b6ebfbe869ec04df

  • SHA1

    36c9ddc3204603890ee817c0d0f7fddafe4ed402

  • SHA256

    ce70da91a13434b7f62a55ed34607b1319599ebe502b65129d8b25888f68e4cf

  • SHA512

    d9dfc7a405fb40d055d8c3028add0ca436ec68aab154afb7ea86ce799266350313778f6d78dc17d6d915cea16d5a5daa56ff5c01814f3ece2922aa28eddb5343

Malware Config

Targets

    • Target

      malware_sfx_v2.exe

    • Size

      11.7MB

    • MD5

      19c56bb998234db3b6ebfbe869ec04df

    • SHA1

      36c9ddc3204603890ee817c0d0f7fddafe4ed402

    • SHA256

      ce70da91a13434b7f62a55ed34607b1319599ebe502b65129d8b25888f68e4cf

    • SHA512

      d9dfc7a405fb40d055d8c3028add0ca436ec68aab154afb7ea86ce799266350313778f6d78dc17d6d915cea16d5a5daa56ff5c01814f3ece2922aa28eddb5343

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks