General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.38157423.13774.29832

  • Size

    119KB

  • Sample

    211206-drb2zsdcbp

  • MD5

    015aae43b84cef99e63a6a518ce5ac14

  • SHA1

    64500abb668d2844d2ca239ab80f6a98478af60d

  • SHA256

    f7ac9f1d654571249f850f8b7cf437d4f5e339350bb56ef4808dc0ca13b78ea4

  • SHA512

    133408c310ac19c29168c30b28fe96427e7a4d69fddb4de31c27430af05e318098e6fcb1fd6ca34efabdd7ba70d85acff93cac9351fd82a6a84f651274fb5faa

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.38157423.13774.29832

    • Size

      119KB

    • MD5

      015aae43b84cef99e63a6a518ce5ac14

    • SHA1

      64500abb668d2844d2ca239ab80f6a98478af60d

    • SHA256

      f7ac9f1d654571249f850f8b7cf437d4f5e339350bb56ef4808dc0ca13b78ea4

    • SHA512

      133408c310ac19c29168c30b28fe96427e7a4d69fddb4de31c27430af05e318098e6fcb1fd6ca34efabdd7ba70d85acff93cac9351fd82a6a84f651274fb5faa

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks