General

  • Target

    aInjector Win64_x32.exe

  • Size

    3.6MB

  • Sample

    211212-p22aeacch2

  • MD5

    45539053a6c4a180b590a7af970fc3ab

  • SHA1

    8a091f013cdbe5b0f7308692a75bd95c544a7e5a

  • SHA256

    e341a13e9d2d6974d68018a8d8f28f4a40ef8b1fe063384eda97ebbbad7ab80a

  • SHA512

    498c61bb0949ef48e1bf834e3fce02ddc7b857e794ce02d97c615f03d2c93420799cd7476bdd4bb15768396cd28668060da0c6e9914039d6bc010f32ddafea85

Score
10/10

Malware Config

Targets

    • Target

      aInjector Win64_x32.exe

    • Size

      3.6MB

    • MD5

      45539053a6c4a180b590a7af970fc3ab

    • SHA1

      8a091f013cdbe5b0f7308692a75bd95c544a7e5a

    • SHA256

      e341a13e9d2d6974d68018a8d8f28f4a40ef8b1fe063384eda97ebbbad7ab80a

    • SHA512

      498c61bb0949ef48e1bf834e3fce02ddc7b857e794ce02d97c615f03d2c93420799cd7476bdd4bb15768396cd28668060da0c6e9914039d6bc010f32ddafea85

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks