General

  • Target

    3a02ed97f9b92e307275316cc895becd

  • Size

    270KB

  • Sample

    211202-21nzxaceen

  • MD5

    3a02ed97f9b92e307275316cc895becd

  • SHA1

    6b8d2ac1c3ceeefd327b2a0fdb1a201bcbec4e51

  • SHA256

    d05f37919d6b294b07cdb76a0a8bb39d50920a29575a0d86411948840ba45b8b

  • SHA512

    41b66454d36267c5731498f301f37ad1b16f764c5d3857ccccdae4a4b05bb065c92aee7f656b72962736b4cded297b7bfd0f43c553a47838f7bd070890b50232

Malware Config

Targets

    • Target

      3a02ed97f9b92e307275316cc895becd

    • Size

      270KB

    • MD5

      3a02ed97f9b92e307275316cc895becd

    • SHA1

      6b8d2ac1c3ceeefd327b2a0fdb1a201bcbec4e51

    • SHA256

      d05f37919d6b294b07cdb76a0a8bb39d50920a29575a0d86411948840ba45b8b

    • SHA512

      41b66454d36267c5731498f301f37ad1b16f764c5d3857ccccdae4a4b05bb065c92aee7f656b72962736b4cded297b7bfd0f43c553a47838f7bd070890b50232

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks