General

  • Target

    loader.exe

  • Size

    5.2MB

  • Sample

    220201-v3bn2aadb6

  • MD5

    fc6f7b81b26442a2ba19d32530a5049a

  • SHA1

    bd0689478f7b3f5bf74af443a1b3a9a3d357bd64

  • SHA256

    b67222864ebeff001e105045e8e15b67d0483ea3a84bf02775f8aa2029d1ac08

  • SHA512

    fb136a02553cc28dfc9bc30b871413525365b22f78a7a0321d87734b6a53fe03b3bc1d8a1697c55af7e1a6a24762b2f40a529b0c9e384174ceae0f69f7da50e9

Malware Config

Targets

    • Target

      loader.exe

    • Size

      5.2MB

    • MD5

      fc6f7b81b26442a2ba19d32530a5049a

    • SHA1

      bd0689478f7b3f5bf74af443a1b3a9a3d357bd64

    • SHA256

      b67222864ebeff001e105045e8e15b67d0483ea3a84bf02775f8aa2029d1ac08

    • SHA512

      fb136a02553cc28dfc9bc30b871413525365b22f78a7a0321d87734b6a53fe03b3bc1d8a1697c55af7e1a6a24762b2f40a529b0c9e384174ceae0f69f7da50e9

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks