General

  • Target

    Justica¤å-comprobante ´2¢M´´S+TWBS¢LG96´´3ED´M¢´SE9+861N´´+2HG+¢+´O´+¢R+.msi

  • Size

    314KB

  • Sample

    211018-zn6yvaffem

  • MD5

    9f12bb12cb957a5a3f106ee0ac310981

  • SHA1

    2139e613e8dc294fe12486492f3336769ec181b5

  • SHA256

    d0fe2c01297574d7482fbc33fa748863fe5d0c1ee32755128833488e146ddf08

  • SHA512

    b0e169dcbdd1b4565f513597494d19e81860d3992a1f0d9ac6dba55f67ad445b03006d119a5b052503604e0c44b58d0b93c987a1e1733aaa0f65703575982f71

Malware Config

Targets

    • Target

      Justica¤å-comprobante ´2¢M´´S+TWBS¢LG96´´3ED´M¢´SE9+861N´´+2HG+¢+´O´+¢R+.msi

    • Size

      314KB

    • MD5

      9f12bb12cb957a5a3f106ee0ac310981

    • SHA1

      2139e613e8dc294fe12486492f3336769ec181b5

    • SHA256

      d0fe2c01297574d7482fbc33fa748863fe5d0c1ee32755128833488e146ddf08

    • SHA512

      b0e169dcbdd1b4565f513597494d19e81860d3992a1f0d9ac6dba55f67ad445b03006d119a5b052503604e0c44b58d0b93c987a1e1733aaa0f65703575982f71

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks