General

  • Target

    vmtools.exe-

  • Size

    3.8MB

  • Sample

    210709-9gcrd71tva

  • MD5

    46f4a0344fda2a58426e4ef513c29341

  • SHA1

    0f894a455821287981084d2b3b9d6c48cdf13cbf

  • SHA256

    8a4db7c132185d220c5e039b09f93b446c4bc9a53f97779a007088c8e40a6a44

  • SHA512

    3784648dfd0d4ff21320464a61c939f15c9a93ddbe7e1155f57c8077b61d588c34140fb166a358ffa6ab64c95400e3b744a1a44fc5acea47f53604869cafec56

Malware Config

Targets

    • Target

      vmtools.exe-

    • Size

      3.8MB

    • MD5

      46f4a0344fda2a58426e4ef513c29341

    • SHA1

      0f894a455821287981084d2b3b9d6c48cdf13cbf

    • SHA256

      8a4db7c132185d220c5e039b09f93b446c4bc9a53f97779a007088c8e40a6a44

    • SHA512

      3784648dfd0d4ff21320464a61c939f15c9a93ddbe7e1155f57c8077b61d588c34140fb166a358ffa6ab64c95400e3b744a1a44fc5acea47f53604869cafec56

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks