General

  • Target

    91ee61e57c81e41ae5a08b93290d4a37

  • Size

    2.7MB

  • Sample

    220111-mfdk4sfeaj

  • MD5

    91ee61e57c81e41ae5a08b93290d4a37

  • SHA1

    0d49fd594abb563aab9fcb51ecaeafb021bcc6c6

  • SHA256

    048692567fb6a593ade6295f2f8a629849a28803a9cb9f7e07031e98059c10ae

  • SHA512

    c514d95765bdbd44db449eb5e623efabef0936e42b8ecbb98879d81ae239f3324f056dd2100f4d3bc333f9b5f7682b61ccd07d8874a1714b29843a96892b3a8d

Malware Config

Targets

    • Target

      91ee61e57c81e41ae5a08b93290d4a37

    • Size

      2.7MB

    • MD5

      91ee61e57c81e41ae5a08b93290d4a37

    • SHA1

      0d49fd594abb563aab9fcb51ecaeafb021bcc6c6

    • SHA256

      048692567fb6a593ade6295f2f8a629849a28803a9cb9f7e07031e98059c10ae

    • SHA512

      c514d95765bdbd44db449eb5e623efabef0936e42b8ecbb98879d81ae239f3324f056dd2100f4d3bc333f9b5f7682b61ccd07d8874a1714b29843a96892b3a8d

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks