29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439

General
Target

29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439

Size

3MB

Sample

220120-hkjkpsgear

Score
9 /10
MD5

4da9953b63df9701effcbdabf0225a47

SHA1

c6b57281d09a692e818b40c56f1ef08c8a4221fb

SHA256

29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439

SHA512

2e6e436dfad558c6f52db26bfa510d61ed741c8f3c4d24f755682f8f9d95662a2c2c7bffc0c518eedc9754f3f75b5e8184e6b76b34a9a7e84e007cb51d976d13

Malware Config
Targets
Target

29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439

MD5

4da9953b63df9701effcbdabf0225a47

Filesize

3MB

Score
9/10
SHA1

c6b57281d09a692e818b40c56f1ef08c8a4221fb

SHA256

29080b370df6a00c28578de988c5429aa0fc412c0977aadb1a56d6ed40a7c439

SHA512

2e6e436dfad558c6f52db26bfa510d61ed741c8f3c4d24f755682f8f9d95662a2c2c7bffc0c518eedc9754f3f75b5e8184e6b76b34a9a7e84e007cb51d976d13

Tags

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    Tags

    TTPs

    Query RegistryVirtualization/Sandbox Evasion
  • Executes dropped EXE

  • Checks BIOS information in registry

    Description

    BIOS information is often read in order to detect sandboxing environments.

    TTPs

    Query RegistrySystem Information Discovery
  • Drops startup file

  • Themida packer

    Description

    Detects Themida, an advanced Windows software protection system.

    Tags

  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery
  • Suspicious use of NtSetInformationThreadHideFromDebugger

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Tasks

                      static1

                      7/10

                      behavioral1

                      9/10