General

  • Target

    d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a

  • Size

    2.6MB

  • Sample

    220111-mr7y4afecq

  • MD5

    9fc7af6629c940c285a28f316a4039f3

  • SHA1

    24bfdfc77cfe9f744be469303233a499c8382bf1

  • SHA256

    d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a

  • SHA512

    ed428f4e2f70d4a225630c2ea07b3129194db0f7e0fc1ddadcf914a51ffb00fcbf127e934631f642e72f235d3fb12105d03cb93111e86ac8782244297e4bcd8e

Malware Config

Targets

    • Target

      d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a

    • Size

      2.6MB

    • MD5

      9fc7af6629c940c285a28f316a4039f3

    • SHA1

      24bfdfc77cfe9f744be469303233a499c8382bf1

    • SHA256

      d352c45f6e8f71a05cf95cf21ff95fcf25a0d15efe304b0d7f11f6161095b31a

    • SHA512

      ed428f4e2f70d4a225630c2ea07b3129194db0f7e0fc1ddadcf914a51ffb00fcbf127e934631f642e72f235d3fb12105d03cb93111e86ac8782244297e4bcd8e

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks