biamou.exe

General
Target

biamou.exe

Size

3MB

Sample

220119-259r6sdhen

Score
9 /10
MD5

4da9953b63df9701effcbdabf0225a47

SHA1

c6b57281d09a692e818b40c56f1ef08c8a4221fb

SHA256

29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439

SHA512

2e6e436dfad558c6f52db26bfa510d61ed741c8f3c4d24f755682f8f9d95662a2c2c7bffc0c518eedc9754f3f75b5e8184e6b76b34a9a7e84e007cb51d976d13

Malware Config
Targets
Target

biamou.exe

MD5

4da9953b63df9701effcbdabf0225a47

Filesize

3MB

Score
9/10
SHA1

c6b57281d09a692e818b40c56f1ef08c8a4221fb

SHA256

29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439

SHA512

2e6e436dfad558c6f52db26bfa510d61ed741c8f3c4d24f755682f8f9d95662a2c2c7bffc0c518eedc9754f3f75b5e8184e6b76b34a9a7e84e007cb51d976d13

Tags

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    Tags

    TTPs

    Query RegistryVirtualization/Sandbox Evasion
  • Executes dropped EXE

  • Sets service image path in registry

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Checks BIOS information in registry

    Description

    BIOS information is often read in order to detect sandboxing environments.

    TTPs

    Query RegistrySystem Information Discovery
  • Drops startup file

  • Loads dropped DLL

  • Themida packer

    Description

    Detects Themida, an advanced Windows software protection system.

    Tags

  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery
  • Suspicious use of NtSetInformationThreadHideFromDebugger

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Privilege Escalation
                    Tasks

                    static1

                    7/10

                    behavioral1

                    9/10