General

  • Target

    25d69c5f67b09e17dd21e832956b43c8

  • Size

    2.7MB

  • Sample

    211225-wm1tnahddj

  • MD5

    25d69c5f67b09e17dd21e832956b43c8

  • SHA1

    fef354161268d73eb8be8f93d63f2241567df06a

  • SHA256

    e614c86dd4d0100b14e064cdbb3931d86c0393dac8ae153074bb911138722359

  • SHA512

    4970f41cdb2cf25d765251a29f1bbf9b866ca4223e126ce8e784b855dd88ef5bf4451748d23364ca860a4c07871ae76bfeeddd0d4589cabe1d6f1575011cda00

Malware Config

Targets

    • Target

      25d69c5f67b09e17dd21e832956b43c8

    • Size

      2.7MB

    • MD5

      25d69c5f67b09e17dd21e832956b43c8

    • SHA1

      fef354161268d73eb8be8f93d63f2241567df06a

    • SHA256

      e614c86dd4d0100b14e064cdbb3931d86c0393dac8ae153074bb911138722359

    • SHA512

      4970f41cdb2cf25d765251a29f1bbf9b866ca4223e126ce8e784b855dd88ef5bf4451748d23364ca860a4c07871ae76bfeeddd0d4589cabe1d6f1575011cda00

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks