General

  • Target

    eb3c5b00bc5347197ae29e42948b225f4871c6ff63856309e0566e546e7cfcb5

  • Size

    2.6MB

  • Sample

    220211-3egjdafagp

  • MD5

    5471e00dc319a006f9a41cb84c46df04

  • SHA1

    a94273294009f89fceda6b263b7c40d18494d4d4

  • SHA256

    eb3c5b00bc5347197ae29e42948b225f4871c6ff63856309e0566e546e7cfcb5

  • SHA512

    86b8b2da5b376a77282af562ecff82dbb0ae44e8180b8dd2712da087e5cfbc8e106618bc5334569fe94820076876f8d8c1ce214f7c455dc03d47de0707d736fb

Malware Config

Targets

    • Target

      eb3c5b00bc5347197ae29e42948b225f4871c6ff63856309e0566e546e7cfcb5

    • Size

      2.6MB

    • MD5

      5471e00dc319a006f9a41cb84c46df04

    • SHA1

      a94273294009f89fceda6b263b7c40d18494d4d4

    • SHA256

      eb3c5b00bc5347197ae29e42948b225f4871c6ff63856309e0566e546e7cfcb5

    • SHA512

      86b8b2da5b376a77282af562ecff82dbb0ae44e8180b8dd2712da087e5cfbc8e106618bc5334569fe94820076876f8d8c1ce214f7c455dc03d47de0707d736fb

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks