General

  • Target

    f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a

  • Size

    2.8MB

  • Sample

    211203-vq1sdscae6

  • MD5

    b0bfa71857896435455b4384a4904dd2

  • SHA1

    8336a87ff18d396c1bda1f59d0e5c9cd0c7e996f

  • SHA256

    f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a

  • SHA512

    a330ef0ae0f2d48bc5a06202bf2b0c1aac672873dc9c6643a5215748a502302c063ef32357279fc65f16c8342e3f5810795475177cdf7e46bae30207da9b15fb

Malware Config

Targets

    • Target

      f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a

    • Size

      2.8MB

    • MD5

      b0bfa71857896435455b4384a4904dd2

    • SHA1

      8336a87ff18d396c1bda1f59d0e5c9cd0c7e996f

    • SHA256

      f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a

    • SHA512

      a330ef0ae0f2d48bc5a06202bf2b0c1aac672873dc9c6643a5215748a502302c063ef32357279fc65f16c8342e3f5810795475177cdf7e46bae30207da9b15fb

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks