General

  • Target

    e718fda21871d54c4bade2114a35411b639bee1afe21ef5c5c9a608e72337a9d

  • Size

    3.5MB

  • Sample

    220120-v264jsahb5

  • MD5

    6f5482d58efd050682c76ca5fc818b66

  • SHA1

    032d2dbc7eed43849a28da095fd4940a370a4620

  • SHA256

    e718fda21871d54c4bade2114a35411b639bee1afe21ef5c5c9a608e72337a9d

  • SHA512

    1c8d8d78c841ab2feff17de48359493b24f64d40dc45b4cc2c4f3daf919fd6d197eba3e65c4881eef47e6037aa19b8389f92dd4d2f189e2510dc9394af4bd790

Malware Config

Targets

    • Target

      e718fda21871d54c4bade2114a35411b639bee1afe21ef5c5c9a608e72337a9d

    • Size

      3.5MB

    • MD5

      6f5482d58efd050682c76ca5fc818b66

    • SHA1

      032d2dbc7eed43849a28da095fd4940a370a4620

    • SHA256

      e718fda21871d54c4bade2114a35411b639bee1afe21ef5c5c9a608e72337a9d

    • SHA512

      1c8d8d78c841ab2feff17de48359493b24f64d40dc45b4cc2c4f3daf919fd6d197eba3e65c4881eef47e6037aa19b8389f92dd4d2f189e2510dc9394af4bd790

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks