General

  • Target

    c45d421ef1cd52ccc0dfa8bbacd093af7fdca76d402c7d773e97a5b1f0c8522a

  • Size

    6.0MB

  • Sample

    211022-l88raabeb3

  • MD5

    4708d7597f8efc46d22031ffc794047a

  • SHA1

    028dd45e2fb27d82f53c14f1dc9abfa3573b8c15

  • SHA256

    c45d421ef1cd52ccc0dfa8bbacd093af7fdca76d402c7d773e97a5b1f0c8522a

  • SHA512

    2e435473f8874a6544044ca3ad6f939e80d87bdbb4dd42427b2c111024dbd8132021044565416cac0d27b8e5f7460bf8f696bfb1c7b04fbff20ef33ff386e4ba

Malware Config

Targets

    • Target

      c45d421ef1cd52ccc0dfa8bbacd093af7fdca76d402c7d773e97a5b1f0c8522a

    • Size

      6.0MB

    • MD5

      4708d7597f8efc46d22031ffc794047a

    • SHA1

      028dd45e2fb27d82f53c14f1dc9abfa3573b8c15

    • SHA256

      c45d421ef1cd52ccc0dfa8bbacd093af7fdca76d402c7d773e97a5b1f0c8522a

    • SHA512

      2e435473f8874a6544044ca3ad6f939e80d87bdbb4dd42427b2c111024dbd8132021044565416cac0d27b8e5f7460bf8f696bfb1c7b04fbff20ef33ff386e4ba

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks