General

  • Target

    SecuriteInfo.com.Trojan.MulDrop19.10258.32603.24964

  • Size

    4.9MB

  • Sample

    211206-drxcxsdccl

  • MD5

    7b7cfe46454f0f7a9c046636eb66dda0

  • SHA1

    9ef56977d9b96e81e42f94ef29b144698685e5d3

  • SHA256

    47e2b9d18762b81536a9a236a382302f9fcb3114e3723a2e90277b903448b536

  • SHA512

    28e5b8eca9048855829528d8e235e52168588c247e036acae791927b9f703394975c38dedcc01a6bdfcefdd1e580d882d97f6eec3a6983c1b21fb4a04cdd0cfd

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.MulDrop19.10258.32603.24964

    • Size

      4.9MB

    • MD5

      7b7cfe46454f0f7a9c046636eb66dda0

    • SHA1

      9ef56977d9b96e81e42f94ef29b144698685e5d3

    • SHA256

      47e2b9d18762b81536a9a236a382302f9fcb3114e3723a2e90277b903448b536

    • SHA512

      28e5b8eca9048855829528d8e235e52168588c247e036acae791927b9f703394975c38dedcc01a6bdfcefdd1e580d882d97f6eec3a6983c1b21fb4a04cdd0cfd

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks