General

  • Target

    972400ba05b0e4e5e160546cc4d3d53141a3d6db00564cbeabd5f3958558c17c

  • Size

    2.8MB

  • Sample

    220208-yb68eadhep

  • MD5

    e1f352dd84afeb4cf39a06fc3c4a135d

  • SHA1

    4ae247438e332e3acc07f563fbb4d8cb37295962

  • SHA256

    972400ba05b0e4e5e160546cc4d3d53141a3d6db00564cbeabd5f3958558c17c

  • SHA512

    13d7d633e322ca4ac209c2e5442e54c4524f3b64473bc62f7481841d414d288c7d37e9349ff710d5a9a5eb6026226e4ec6b761e25d8f0d2e8831ca40748c1bc7

Malware Config

Targets

    • Target

      972400ba05b0e4e5e160546cc4d3d53141a3d6db00564cbeabd5f3958558c17c

    • Size

      2.8MB

    • MD5

      e1f352dd84afeb4cf39a06fc3c4a135d

    • SHA1

      4ae247438e332e3acc07f563fbb4d8cb37295962

    • SHA256

      972400ba05b0e4e5e160546cc4d3d53141a3d6db00564cbeabd5f3958558c17c

    • SHA512

      13d7d633e322ca4ac209c2e5442e54c4524f3b64473bc62f7481841d414d288c7d37e9349ff710d5a9a5eb6026226e4ec6b761e25d8f0d2e8831ca40748c1bc7

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Tasks