General

  • Target

    47278765c8eb8758d13014ef6171f9e6

  • Size

    2.6MB

  • Sample

    211211-s22sqacfhm

  • MD5

    47278765c8eb8758d13014ef6171f9e6

  • SHA1

    6b99a2281579c632667a40c11c8c4a054c66fab3

  • SHA256

    af350797dd1ba1459256609ef7a6971149602a3ea7cde8f05ff65010963b98b0

  • SHA512

    dbc1db103e20f0f264e48ca02222fdb0c4fd1d2c805c28feba71ccbad909e20a9b288dd59e799f2db28d5b4ff955f5e2356aee203e66fc9ca1bdc74258ffe8a3

Malware Config

Targets

    • Target

      47278765c8eb8758d13014ef6171f9e6

    • Size

      2.6MB

    • MD5

      47278765c8eb8758d13014ef6171f9e6

    • SHA1

      6b99a2281579c632667a40c11c8c4a054c66fab3

    • SHA256

      af350797dd1ba1459256609ef7a6971149602a3ea7cde8f05ff65010963b98b0

    • SHA512

      dbc1db103e20f0f264e48ca02222fdb0c4fd1d2c805c28feba71ccbad909e20a9b288dd59e799f2db28d5b4ff955f5e2356aee203e66fc9ca1bdc74258ffe8a3

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks