General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware1.9284.10163

  • Size

    2.3MB

  • Sample

    211213-s1xsdadgf3

  • MD5

    aa490d623ce35534b4b5cd6f73d7c7df

  • SHA1

    3fca5c6c55e9fce384b35544f6a7d17ca003a2eb

  • SHA256

    cb3e7a8aa992a9161844025266cc333567e192ef73bb4590c95ef0994d7456f6

  • SHA512

    d3f67c70d32352ac18c8b6917d52e9a67d74716cdb56e7c44ca66cb5c58622fe39cef0d0590858c731002c53ae55bacff6e1d1a2fafbe8609f1ef33226cf7c23

Malware Config

Targets

    • Target

      SecuriteInfo.com.W32.AIDetect.malware1.9284.10163

    • Size

      2.3MB

    • MD5

      aa490d623ce35534b4b5cd6f73d7c7df

    • SHA1

      3fca5c6c55e9fce384b35544f6a7d17ca003a2eb

    • SHA256

      cb3e7a8aa992a9161844025266cc333567e192ef73bb4590c95ef0994d7456f6

    • SHA512

      d3f67c70d32352ac18c8b6917d52e9a67d74716cdb56e7c44ca66cb5c58622fe39cef0d0590858c731002c53ae55bacff6e1d1a2fafbe8609f1ef33226cf7c23

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks