General

  • Target

    a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554

  • Size

    5.3MB

  • Sample

    220212-bz6v8aeee9

  • MD5

    bba1bdfef7cc8d44ad93a65943263c7d

  • SHA1

    c3a3b6690d07c032214ed870d4b6e3a7ad474077

  • SHA256

    a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554

  • SHA512

    0467e862df0d2b2b37b4982dca78f7c8b2079e2060f2252bc3122d9a644292be57372cb4d899a2dfd335093623e133db088b33bc6a9661b5b8453cc341c1c76c

Malware Config

Targets

    • Target

      a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554

    • Size

      5.3MB

    • MD5

      bba1bdfef7cc8d44ad93a65943263c7d

    • SHA1

      c3a3b6690d07c032214ed870d4b6e3a7ad474077

    • SHA256

      a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554

    • SHA512

      0467e862df0d2b2b37b4982dca78f7c8b2079e2060f2252bc3122d9a644292be57372cb4d899a2dfd335093623e133db088b33bc6a9661b5b8453cc341c1c76c

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Command and Control

Web Service

1
T1102

Tasks