General

  • Target

    a486e98ea8d025f3510f79b22f56e344f18c29a64a21b15cd1b3caa2721bf554

  • Size

    5.4MB

  • Sample

    211203-v3afzahbam

  • MD5

    6313fcca4988a89b15e1e68b7c9ee96e

  • SHA1

    a53ce6d8455d9f0cea51c0863425532f96d3250d

  • SHA256

    a486e98ea8d025f3510f79b22f56e344f18c29a64a21b15cd1b3caa2721bf554

  • SHA512

    c13536c79b25b0b048fa255f7dffccb10b1d4c9515c303095d1787021fc51c37464dadddaf30f5c6d01859316447ff874e114a8025e4389237cf704dcb616398

Malware Config

Targets

    • Target

      a486e98ea8d025f3510f79b22f56e344f18c29a64a21b15cd1b3caa2721bf554

    • Size

      5.4MB

    • MD5

      6313fcca4988a89b15e1e68b7c9ee96e

    • SHA1

      a53ce6d8455d9f0cea51c0863425532f96d3250d

    • SHA256

      a486e98ea8d025f3510f79b22f56e344f18c29a64a21b15cd1b3caa2721bf554

    • SHA512

      c13536c79b25b0b048fa255f7dffccb10b1d4c9515c303095d1787021fc51c37464dadddaf30f5c6d01859316447ff874e114a8025e4389237cf704dcb616398

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks