General

  • Target

    b0b243f5f8177da039c477f439d40b97

  • Size

    5.8MB

  • Sample

    220205-s8shmadbdq

  • MD5

    b0b243f5f8177da039c477f439d40b97

  • SHA1

    a70266c61c18b8d1fd99a0108e6c776f29b6144b

  • SHA256

    1a597ff0090a8631f642c4b9223939fbb3535ebc8b001f1223aaeab9fbaa8d0f

  • SHA512

    a94e005ff1820837a60d111bc9644b55dd332c887bb4d0590a4fbfc08edf5e91a587fada5c02564e0b5fc6dc7e8aeb09ecc7edca272a172f2cefeecbd65b9e79

Malware Config

Targets

    • Target

      b0b243f5f8177da039c477f439d40b97

    • Size

      5.8MB

    • MD5

      b0b243f5f8177da039c477f439d40b97

    • SHA1

      a70266c61c18b8d1fd99a0108e6c776f29b6144b

    • SHA256

      1a597ff0090a8631f642c4b9223939fbb3535ebc8b001f1223aaeab9fbaa8d0f

    • SHA512

      a94e005ff1820837a60d111bc9644b55dd332c887bb4d0590a4fbfc08edf5e91a587fada5c02564e0b5fc6dc7e8aeb09ecc7edca272a172f2cefeecbd65b9e79

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks