General

  • Target

    d19ad5fbe2455393c8b4bf7203754461.exe

  • Size

    5.4MB

  • Sample

    211206-v65raahfd3

  • MD5

    d19ad5fbe2455393c8b4bf7203754461

  • SHA1

    db97f0945094fb160c3f7154d230ed268842a6e8

  • SHA256

    7805fe3ed51586271c54f625091f394625e087a4157e3ad45e0222786772de8c

  • SHA512

    43ee8f5e9b15a6736eff2179e46b8b68c7a968a3b12032356c7b98e3bbff8ccd4fcaf9a62ceba3f8fd0e244de635d90044825b5877e842a6a828fd5bedc1b921

Malware Config

Targets

    • Target

      d19ad5fbe2455393c8b4bf7203754461.exe

    • Size

      5.4MB

    • MD5

      d19ad5fbe2455393c8b4bf7203754461

    • SHA1

      db97f0945094fb160c3f7154d230ed268842a6e8

    • SHA256

      7805fe3ed51586271c54f625091f394625e087a4157e3ad45e0222786772de8c

    • SHA512

      43ee8f5e9b15a6736eff2179e46b8b68c7a968a3b12032356c7b98e3bbff8ccd4fcaf9a62ceba3f8fd0e244de635d90044825b5877e842a6a828fd5bedc1b921

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks